Features
Parents May Be Liable for Child's Activity on Facebook
It's 10 p.m. Do you know what your children are posting online?
Features
To Correct or Not Correct Misinformation in Social Media
In June 2014, the FDA issued a draft guidance document on correcting independent third-party misinformation on social media. While the draft guidance is not legally binding, it offers insight on the implications of whether or not to correct misinformation.
Features
Cybersecurity Practices Booming In Era of the Breach
The cybersecurity woes of companies like Target and Sony in 2014 and Anthem last month have meant a busy start to 2015 for law firm data-privacy and security practices.
Features
<b><i>Online Extra</b></i> Ninth Circuit Agrees to Revisit Ruling in Model Rape Case
With urging from Facebook, Craigslist, eBay and others, the Ninth Circuit has agreed to reconsider a controversial ruling about website operators' duty to warn about potential harm by third parties.
Columns & Departments
Upcoming Event
SXSW Music Conference 2015 CLE Program. Austin, TX, March 20-21
Features
<b><i>Online Extra</b></i> Turning Cybersecurity Into a Serious 'Game of Threats'
The last few years have seen some creative new methods of getting businesses engaged in protecting their networks and data. PricewaterhouseCoopers has created a cybersecurity computer game. PwC's 'Game of Threats' walks businesspeople, playing either as a team of nefarious hackers or as a company being attacked, through the important decisions they have to make during a breach, in hopes of giving them a deeper knowledge of cybersecurity and its challenges.
Features
Viacom and Google Defeat Privacy Claims over Kids' Online Data
A federal judge in Newark dismissed multidistrict litigation against Google Inc. and Viacom Inc. in rejecting claims that the companies' online data collection violates the privacy of children under 13.
Features
Laying a Foundation for Integrated e-Discovery Systems
Typically, the production of data in litigation involves a series of disconnected actions involving several corporate or cloud-based systems. These disassociated e-discovery activities ' identify, preserve, collect, and track (IPCT) ' are then feed into a downstream set of processing, review, and production (PRP) steps often hosted outside the corporate firewall. Fortunately, technology advances are helping counsel and client alike to integrate systems and streamline processes both inside and across the firewall.
Features
e-Commerce Website Methods Are Patent Eligible
On Dec. 5, 2014, a divided Federal Circuit panel held that claims directed to systems and methods of generating a composite Web page combining certain visual elements of a "host" website with content of a third-party merchant were "necessarily rooted in computer technology in order to overcome a problem specifically arising in the realm of computer networks," and, therefore, were patent-eligible. However, the court cautioned that not all claims addressing Internet-centric challenges are patent-eligible.
Columns & Departments
Net News
In This Facebook Threats Case, No Wait for High Court <br>Judge Gives Go-Ahead To Facebook Privacy Suit<br>Appeals Court: No Privacy for Facebook Photo In Slip-and-Fall Case
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- When Is a Repair Structural or Nonstructural Under a Commercial Lease?A common question that commercial landlords and tenants face is which of them is responsible for a repair to the subject premises. These disputes often center on whether the repair is "structural" or "nonstructural."Read More ›
- Beach Boys Songs Written Decades Ago Triggered Current Quarrel With LawyersThere's current litigation in the ongoing Beach Boys litigation saga. A lawsuit filed in 2019 against Nevada residents Mike Love and his wife Jacquelyne in the U.S. District Court for the District of Nevada that alleges inaccurate payment by the Loves under the retainer agreement and seeks $84.5 million in damages.Read More ›
- Coverage Issues Stemming from Dry Cleaner Contamination SuitsIn recent years, there has been a growing number of dry cleaners claiming to be "organic," "green," or "eco-friendly." While that may be true with respect to some, many dry cleaners continue to use a cleaning method involving the use of a solvent called perchloroethylene, commonly known as perc. And, there seems to be an increasing number of lawsuits stemming from environmental problems associated with historic dry cleaning operations utilizing this chemical.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Technology in Marketing: Where to Invest Your Marketing Technology DollarsLaw firms have realized that using technology ' particularly the Internet ' is a powerful tool for creating a more level playing field to enhance their images, expand their visibility in targeted markets and drive business to their firms. However, with so many competing interests for limited marketing dollars, where should you invest your firm's resources to get the most bang for the buck?Read More ›