Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Best Practices for Law Firms to Meet Cybersecurity Requirements of Inside Counsel Image

Best Practices for Law Firms to Meet Cybersecurity Requirements of Inside Counsel

Jason Straight

Whether or not your clients have suffered a data breach, cybersecurity is undoubtedly a critical concern. Many of your clients are actively searching for and plugging any gaps in their security. And if your clients haven't done so already, they're also going to focus their attention on what could potentially be an Achilles Heel for them ' their law firms.

Features

<b><i>Online Extra:</b></i> Pao Lawyers Slap Facebook With Discrimination Suit Image

<b><i>Online Extra:</b></i> Pao Lawyers Slap Facebook With Discrimination Suit

Marisa Kendall

A former Facebook employee is suing the company for gender discrimination and harassment, claiming her supervisor belittled her at work and asked why she 'did not just stay home and take care of her child.'

Features

<b><i>Online Extra:</b></i> Hulu Lawyers Land Punch in Privacy Suit Image

<b><i>Online Extra:</b></i> Hulu Lawyers Land Punch in Privacy Suit

Ross Todd

U.S. Magistrate Judge Laurel Beeler said she didn't want February's hearing in a privacy suit against Hulu LLC to feel like 'a wake.' But the Northern District of California judge put the case on life support, at the very least, indicating that she's leaning toward knocking out the remaining claims in a 2011 suit under the Video Privacy Protection Act.

Features

<b><i>Online Extra:</b></i> Judge Orders Litigious Adult Website to Pay $5.6 Million Image

<b><i>Online Extra:</b></i> Judge Orders Litigious Adult Website to Pay $5.6 Million

Vanessa Blum

A federal judge has ordered a litigious adult website to pay $5.6 million in attorney fees and costs under the Copyright Act, saying its motives for suing Giganews Inc. and Livewire Services Inc. had more to do with creating a tax write-off for its owner than with protecting its copyrights.

Features

<b><i>Online Extra:</b></i> New Russian Data Residency Law Will Soon Take Effect Image

<b><i>Online Extra:</b></i> New Russian Data Residency Law Will Soon Take Effect

Ed Silverstein

There is a new Russian data residency law that will likely impact many companies, which somehow have business connections with Russia.

Features

When Your Data Goes Viral Image

When Your Data Goes Viral

Sherilyn Pastor & Kelly Lloyd

As discussed in Part One of this article, a data breach can jeopardize a company's confidential information such as client records, trade secrets, privileged legal information, or employee records. Although many associate data breaches with hackers or cyberattacks, human error, such as a mistake in computer coding or losing a company laptop, also results in significant breaches.

Features

With Highly Anticipated Copyright Decision, The AutoHop Litigation Is Coming to a Close Image

With Highly Anticipated Copyright Decision, The AutoHop Litigation Is Coming to a Close

J. Alexander Lawrence

In 2012, DISH Network announced two novel product offerings that would result in considerable backlash from the four major broadcast television networks and set in motion a three-year, wide-ranging, multi-front battle with the networks. As the dust now begins to settle, the copyright litigation has resulted in important precedents that will help define the boundaries under the Copyright Act for the multi-channel programming distribution industry.

Features

Federal Judge Rules For Defendant in Porn Copyright Case Image

Federal Judge Rules For Defendant in Porn Copyright Case

Saranac Hale Spencer

An anonymous <i>pro se</i> defendant has beaten copyright infringement claims brought against him in federal court by a maker of pornographic videos. The defendant's victory runs counter to the result in a similar case in front of a different Eastern District judge.

Features

How to Obtain Social Media Data For Defending Lawsuits Image

How to Obtain Social Media Data For Defending Lawsuits

Emily T. Acosta & Eric P. Conn

Obtaining social media user content under most circumstances is extremely difficult ' unless you use the correct strategy. Simply sending discovery requests without a basic understanding of the information available is a fool's errand. It is pivotal that a practitioner who wants to conduct formal discovery of social media user content understand how each site stores and communicates its data.

Features

After Anthem, Diagnosing the Health of Data Security Image

After Anthem, Diagnosing the Health of Data Security

Rebekah Mintzer

Companies have begun to experience attempts to breach their databases on a frequent basis, and have had to become hypervigilant about protecting their networks against hackers. But once every couple of months, the bad guys get through the defense systems in a big and highly publicized way, showcasing data disaster for company and customers. This was the case in early February when Anthem Inc., the second-largest health insurance company in the U.S., announced it had been hacked.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›