Features
Unconscionable Terms Prevent Enforceability of e-Commerce Contract Clauses
e-Commerce, like traditional commerce, relies on contracts. But unlike traditional commerce, e-commerce typically relies utterly on agreements drafted and presented by one party on a 'take-it-or-leave-it' basis. The validity of such contracts arises from the recipient's 'adherence' to the terms given. These so-called adhesion contracts are enforceable, except to the extent that a court finds a term unconscionable.
Features
How to Increase Your Odds of Project Success Through the RFP Process
Are you among the majority of IT professionals who view the Request for Proposal ('RFP') as the most tedious business document ever created? The RFP itself is fairly standardized, but the process of collecting information and evaluating vendors is time-consuming and uninspiring. While there are any number of thick manuals that describe the best practices for an RFP process, this article may shed light on some 'quick wins' that will enable you to boost the efficiency of your RFP process.
Features
Ensuring Security with VoIP
Among U.S. businesses, Voice over Internet Protocol ('VoIP') is growing in popularity and will continue to do so. In-Stat predicts that two-thirds of U.S. businesses will have some form of VoIP service by 2011. When deciding to use this powerful technology, organizations should look for VoIP providers that offer specific security measures within their product to ensure that the technology is used most effectively ' and virtually without any security concerns.
Features
Can Software Be a Service?
You're probably tired of hearing the phrase 'think outside the box,' but that's an accurate characterization of 'software-as-a-service' ('SaaS'). The 'box' is the computer that sits on your desk; and SaaS is an innovative way to deliver software applications to that computer over the Internet.
Features
<b>Net News</b> Ninth Circuit Text-message Ruling Could Impact Corporate Policies
Most employees know that their bosses are usually within their rights snooping on workers' e-mail, but text messaging has been in murkier territory. A federal appeals court sought to clarify matters in a ruling last month by distinguishing between electronic communication that employers store on their servers, or pay someone to store, and communication that is contracted out to third parties.
Features
Redefining Prior Art Under Proposed Patent Reform Measures
This is the first installment of a two-part series on the proposed move from a patent system granting priority of patent rights based upon invention dates to a system in which priority is based primarily upon filing dates. This installment discusses the history behind the current first-to-invent system, the current patent reform movement, and the basic proposed change to the current system.
Features
Net News
You Tube Suit Threatens Online Communication<br>Yahoo Files Suit Against Lottery Spammers
Features
Downloading Cases Hearten the Defense
Defense lawyers in copyright infringement cases brought by members of the RIAA are trumpeting as victories three recent court decisions that rein in the association's campaign against individuals who make songs available for distribution on the Web.
Features
Secret Online Identity
Companies and their employees at times face the difficult issue of protecting themselves from cybersmears by anonymous Internet users. One of the most problematic issues is the tension between identifying what is protected speech under the First Amendment, and the standard that must be met in order to obtain the identity of an anonymous poster who has used the Internet to spread damaging statements.
Features
e-Commerce Docket Sheet
No CAN-SPAM Claims When ISP Cannot Show Real Adverse Effects<br>Court Says Departing Worker's Computer Access No CFAA Breach<br>No Impleading ISP, P2P Network on Unrelated Torts<br>Roommate Site Not Immune under CDA From FHA Claims<br>Non-residents Using Others' Trademarks for Web Traffic Answers in Owner's Forum
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Enhanced Oversight of Search Warrants and Title III WiretapsSearch warrants and wiretaps were once used primarily to investigate organized crime, drug dealing and terrorism. In recent years, however, prosecutors have employed these tools increasingly in the context of white-collar crime to the point where it is now commonplace.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The Right to Associate in the DefenseThe "right to associate" permits the insurer to work with the insured to investigate, defend, or settle a claim. Such partnerships protect the insurer and can prove beneficial to the insured's underlying case and ultimate exposure.Read More ›
- DOJ's Cyber Fraud Initiative: A Wake-up Call That Keeps RingingDOJ's Cyber Fraud Initiative has been a wake-up call for companies to prioritize cybersecurity and adhere to stringent standards. By leveraging the FCA, DOJ has used a powerful enforcement tool to target a wide range of cybersecurity failures and misrepresentations. The increasing focus on cybersecurity by enforcement agencies means that robust cybersecurity practices are becoming a standard expectation, not just a best practice.Read More ›