Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

<i>Case Study:</i> How Mesa Systems Resolved Its Phishing Issues Image

<i>Case Study:</i> How Mesa Systems Resolved Its Phishing Issues

Steven Davidson

Phishing is a constantly changing landscape, which requires unwavering attention and focus.

Features

Iglesias's Music Streaming Suit Confronts Big Industry Issue Image

Iglesias's Music Streaming Suit Confronts Big Industry Issue

Samantha Joseph

Music superstar Enrique Iglesias wasn't dancing around the point when he recently filed a lawsuit in Miami federal court against Universal International Music.

Features

<i>Online Extra</i>: e-Discovery Pioneer, Judge Andrew Peck, Retires Image

<i>Online Extra</i>: e-Discovery Pioneer, Judge Andrew Peck, Retires

Ian Lopez

<b><i>One of e-Discovery's Most Influential Figures</b></i><p>After over two decades as a magistrate judge for the Southern District of New York, Peck will retire and join DLA Piper.

Features

Marketing Tech: Finding a Few More Minutes for Marketing and Business Development Image

Marketing Tech: Finding a Few More Minutes for Marketing and Business Development

Ari Kaplan

Years ago, when trying to improve some of my snacking habits, I stopped buying cookies, candy and savory chips. Magically (and perhaps obviously), I quickly found that I ate less junk food. In effort to find a few more minutes a day for marketing, I recently applied this same basic, but effective, technique to my time management and the results have been just as immediate.

Features

<i>e-Discovery:</i> Four Cases Highlighting e-Discovery Trends in the Second Half of 2017 Image

<i>e-Discovery:</i> Four Cases Highlighting e-Discovery Trends in the Second Half of 2017

Mike Hamilton

In the second half of 2017, case law served to clarify what does and does not constitute reasonable policies and procedures for preserving information subject to discovery — as well as the risks you run if you fail to follow through on those policies.

Features

Use of the Blockchain to Contract Digitally Image

Use of the Blockchain to Contract Digitally

Paige M. Boshell

Smart contracts are self-executing agreements written in code on the blockchain. Parties contract digitally using distributed ledger technology. This article offers a layperson's, non-technical summary of the underlying technology and consideration of certain legal implications for smart-contracting and contract management.

Features

Law Firm Security Q&A Image

Law Firm Security Q&A

Adam Schlagman

With the Appleby data breach still top of mind of many law firm and legal department professionals, cybersecurity has become a major area of concern. To learn more about how law firms can protect themselves against cyber attacks and data breaches, we sat down with Laurie Fischer, managing director at HBR Consulting.

Features

Online Marketing Practices Continue to Pose Regulatory Threats for the Financial Services Industry Image

Online Marketing Practices Continue to Pose Regulatory Threats for the Financial Services Industry

Craig Nazzaro, Brad Rustin & Elizabeth A. DeVos

Last year, the Federal Trade Commission (FTC) released a staff report on Cross-Device Tracking, which added to the FTC's efforts to regulate emerging issues in the ever-evolving area of online behavioral advertising. The advertising in question involves the collection of data from a particular computer or device regarding a user's Internet-viewing behavior over time and across non-affiliate websites. Ostensibly, this technology obtains user preferences or interests. Cross-device tracking is the logical next step for this technology.

Features

Second Edition ABA Cybersecurity Handbook Reflects the Need for Greater Awareness Image

Second Edition ABA Cybersecurity Handbook Reflects the Need for Greater Awareness

Mark Sangster

As 2017 came to a close, the American Bar Association opened the next chapter in cybersecurity awareness with the release of the second edition of its…

Features

Password-Sharing May Be a Federal Crime under the Muddied Waters of the CFAA Image

Password-Sharing May Be a Federal Crime under the Muddied Waters of the CFAA

Shain Khoshbin & Aaron Dilbeck

The Computer Fraud and Abuse Act (CFAA) is a federal statute that provides for not only criminal liability, but also civil liability, when a person accesses…

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The Flight to Quality and Workplace Experience
    That the pace of change is "accelerating" is surely an understatement. What seemed almost a near certainty a year ago — that law firms would fully and permanently embrace work-from-home — is experiencing a seeming reversal. While many firms have, in fact, embraced hybrid operations, the meaning of hybrid has evolved from "office optional," to an average required 2 days a week, to now many firms coming out with four-day work week mandates — this time, with teeth.
    Read More ›
  • Blockchain Domains: New Developments for Brand Owners
    Blockchain domain names offer decentralized alternatives to traditional DNS-based domain names, promising enhanced security, privacy and censorship resistance. However, these benefits come with significant challenges, particularly for brand owners seeking to protect their trademarks in these new digital spaces.
    Read More ›
  • The Powerful Impact of The Non-Foreclosure Notice of Pendency
    RPAPL ' 1331 and RPAPL ' 1403 Notices of Pendency are requisite elements for foreclosing a mortgage. <i>See, Chiarelli v. Kotsifos</i>, 5 A.D.3d 345 (a notice of pendency is a prerequisite to obtaining a judgment in a mortgage foreclosure action); <i>Campbell v. Smith</i>, 309 A.D.2d 581, 582 (a notice of pendency is required in a foreclosure action under RPAPL Article 13). In contrast, an ex parte CPLR Article 65 Notice of Pendency (the "Notice") is not required but it is a significant tool in an action claiming title to, or an interest in or the use or enjoyment of, another's land. The filer does not have to make a meritorious showing or post a bond. Article 65 provides mechanisms for the defendant-owner to vacate the Notice that caused an unilaterally imposed restraint on its realty. But, recent case law establishes the near futility of such efforts if the plaintiff has satisfied the minimal statutory requisites for filing the Notice.
    Read More ›