Features
No Defamation From Comments on Atlanta Reality TV Show
An Atlanta R&B singer who said on a reality TV show that the CEO of her former record label mismanaged her career and beat her years ago in a hotel room has prevailed in a defamation lawsuit the CEO brought in Fulton County Superior Court.
Features
Legal Incubators and Legal Hackers
Legal training in law schools prescribes an unflinching adherence to precedent. This paradigm is further reinforced in most traditional legal practice settings. In contrast, the legal hacking ethos directly attacks the rigidity of the precedent-based mindset. Legal hackers don't think: "what's been done before?" but instead "what can we do now?"
Features
Securing a Document Review Center: A Practical Guide
Much ink has been spilled in recent years about information security, hacker exploits and hardware and software products used to thwart hackers. Not a single day goes by without news pertaining to the discovery of vulnerabilities in the software we use and cherish, and to hacker exploits affecting the companies we use in our daily lives.
Features
Legal Issues in Fantasy Sports
Fantasy sports once represented a seasonal hobby among friends and coworkers. However, it has now undeniably blossomed into a force in both the American culture and, more important, the U.S. economy. The explosion of fantasy sports can be directly traced to the favored status bestowed upon fantasy sports contests by federal anti-gaming laws ' specifically the Unlawful Internet Gambling Enforcement Act (UIEGA).
Features
<b><i>Online Extra:</b></i> Up to Senate to Vote on Cybersecurity Legislation
Following the recent approval by the House of Representatives of two controversial cybersecurity bills, it is now up to the Senate to move forward on its proposal, which would encourage the sharing of cyberthreat information.
Features
Third Circuit Weighs Novel Cybersecurity Case
Five years ago, Russian hackers broke into the Wyndham Hotels computer network and stole the credit card information for thousands of customers, a security breach that has now put the novel question of whether the FTC can sue a company for failing to properly secure its data in front of the Third Circuit.
Features
Browse, Click, Sign, Enforce
Signing, dating and keeping a record of a paper contract are standard practice ' afterthoughts most of the time. However, that standard practice does not easily translate to online legal agreements ' the agreements that are native to websites, mobile apps and other digital platforms, such as "Terms of Use," "Terms of Service," "Privacy Policies" and disclaimers.
Features
Representing Clients Ethically in the Digital Age
While technology is constantly evolving, attorneys' ethical duties to provide competent representation and preserve confidentiality remain the same. From initial intake through litigation, technical competence is required.
Features
Process Is the Key To Success When Applying Legal Technology To Discovery
The litigation industry is awash with technology. According to consulting firm Gartner, law firms, corporations and service providers spent almost $2 billion in 2014 buying or licensing e-discovery software, almost none of which existed just 10 years ago. Why? The primary driver has been the explosion in the amount and variety of discoverable data in the world.
Features
The Internet User's Duty of Care
The duty one Internet user has to another has changed, particularly with respect to cybersecurity and privacy. Negligence by Internet users has enabled hackers and creators of viruses to exploit computer systems and engage in crime and unwanted computer intrusions.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›