Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Application of Bankruptcy Law to Internet Assets Image

Application of Bankruptcy Law to Internet Assets

Jonathan Bick

Internet assets generally, and Internet asset licenses in particular, are increasingly subject to bankruptcy proceedings.

Features

The 'Soft Underbelly' of Cybersecurity Meets Legal Ethics Image

The 'Soft Underbelly' of Cybersecurity Meets Legal Ethics

Jerry Cohen

Legal departments for business organizations rate cybersecurity, regulation and ethics compliance among their chief concerns, and they are well aware of surveys showing law firms to be the "soft underbelly" of business security due to weakness of their cybersecurity.

Features

A 'Loss' Under the CFAA Does Not Require Interruption of Service Image

A 'Loss' Under the CFAA Does Not Require Interruption of Service

Richard Raysman & Peter Brown

This article focuses on what federal appellate courts agree upon with regard to the text of the CFAA.

Features

<b><i>Online Extra</b></i><br>Are You Ready for the New China Cybersecurity Law? Image

<b><i>Online Extra</b></i><br>Are You Ready for the New China Cybersecurity Law?

Zach Warren

<b><i>A Consilio Survey Found 75% of Legal Tech Professionals Are Unfamiliar with the Law, But Multinational Companies Can Still Prepare Before the June Implementation</b></i><p>In December 2016, China passed a comprehensive Cybersecurity Law, expanding the country's data localization requirement once it goes into effect this June and sparking heated debate among Chinese lawmakers. Some experts say even more legislation could be on the way.

Features

Beware the W-2 Phishing Scam Image

Beware the W-2 Phishing Scam

Patrick H. Haggerty & Kathryn C. Mellinger

In 2016, numerous businesses fell victim to a surge of phishing scams involving W-2 forms. In response, the IRS sent a broad consumer alert regarding these schemes after seeing an approximate 400% surge in phishing and malware attacks during the 2016 season. As the tax filing season ramps up for 2017, we have already seen a number of successful attempts to obtain W-2 forms from unsuspecting employees.

Features

Three Things Law Firms Should Consider When Using Website Metrics Image

Three Things Law Firms Should Consider When Using Website Metrics

Google Analytics Can Prove a Useful Tool in Helping Firms Draw More Clients

<b><i>Google Analytics Can Prove a Useful Tool in Helping Firms Draw More Clients</b></i><br>Many law firms proclaim their excellence by touting top lawyers from prestigious schools and decades of courtroom success. While these facts still afford some strategic advantages, an effective content marketing strategy is another way to gain an edge over your competition in today's legal market.

Features

The Evolution of the 'Virtual Law Firm' Image

The Evolution of the 'Virtual Law Firm'

Gabrielle Orum Hernández

<b><i>Though 'Virtual Firms' Are on the Decline, Cloud Technology May Be Shifting the Model to Refocus on Lawyer Mobility</b></i><br>The rise of cloud computing in particular has made it possible for attorneys to keep all the technology tools they need to practice on hand at all times, and eschew direct client contact and office space if so desired.

Features

Cybersecurity Insurance<br><b><i><font="-1">Untangling the Mystery</b></i></font> Image

Cybersecurity Insurance<br><b><i><font="-1">Untangling the Mystery</b></i></font>

Sean B. Cooney

High-profile breaches have encouraged many businesses to proactively assess their cyber liabilities, and implement prevention and response plans. Fortunately, there are more technology options available to protect businesses than ever before, and both the U.S. government and private industry have made great strides in understanding and combating some of the most common cyber threats.

Features

Untangling the Mystery of Cybersecurity Insurance Image

Untangling the Mystery of Cybersecurity Insurance

Sean Cooney

There are more technology options available to protect businesses than ever before, and both the U.S. government and private industry have made great strides in understanding and combating some of the most common cyber threats.

Features

The Constitutionality of Using Cell-Site Simulators Image

The Constitutionality of Using Cell-Site Simulators

Richard Raysman & Peter Brown

According to the Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology (Sept. 3, 2015), a cell-site simulator “function[s] by…

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Bankruptcy Sales: Finding a Diamond In the Rough
    There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
    Read More ›
  • Supreme Court Asked to Assess Per Se Rule Tension in Criminal Antitrust
    In recent years, practitioners have observed a tension between criminal enforcement of the broadly written terms of the Sherman Antitrust Act of 1890 and the modern Supreme Court's notions of statutory interpretation and due process in the criminal law context. A certiorari petition filed in late August in Sanchez et al. v. United States, asks the Supreme Court to address this tension, as embodied in the judge-made per se rule.
    Read More ›
  • Restrictive Covenants Meet the Telecommunications Act of 1996
    Congress enacted the Telecommunications Act of 1996 to encourage development of telecommunications technologies, and in particular, to facilitate growth of the wireless telephone industry. The statute's provisions on pre-emption of state and local regulation have been frequently litigated. Last month, however, the Court of Appeals, in <i>Chambers v. Old Stone Hill Road Associates (see infra<i>, p. 7) faced an issue of first impression: Can neighboring landowners invoke private restrictive covenants to prevent construction of a cellular telephone tower? The court upheld the restrictive covenants, recognizing that the federal statute was designed to reduce state and local regulation of cell phone facilities, not to alter rights created by private agreement.
    Read More ›