Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Parents May Be Liable for Child's Activity on Facebook Image

Parents May Be Liable for Child's Activity on Facebook

Jeffrey N. Rosenthal

It's 10 p.m. Do you know what your children are posting online?

Features

To Correct or Not Correct Misinformation in Social Media Image

To Correct or Not Correct Misinformation in Social Media

Alan G. Minsk

In June 2014, the FDA issued a draft guidance document on correcting independent third-party misinformation on social media. While the draft guidance is not legally binding, it offers insight on the implications of whether or not to correct misinformation.

Features

Cybersecurity Practices Booming In Era of the Breach Image

Cybersecurity Practices Booming In Era of the Breach

Gina Passarella & David Gialanella

The cybersecurity woes of companies like Target and Sony in 2014 and Anthem last month have meant a busy start to 2015 for law firm data-privacy and security practices.

Features

<b><i>Online Extra</b></i> Ninth Circuit Agrees to Revisit Ruling in Model Rape Case Image

<b><i>Online Extra</b></i> Ninth Circuit Agrees to Revisit Ruling in Model Rape Case

Scott Graham

With urging from Facebook, Craigslist, eBay and others, the Ninth Circuit has agreed to reconsider a controversial ruling about website operators' duty to warn about potential harm by third parties.

Columns & Departments

Upcoming Event Image

Upcoming Event

ALM Staff & Law Journal Newsletters

SXSW Music Conference 2015 CLE Program. Austin, TX, March 20-21

Features

<b><i>Online Extra</b></i> Turning Cybersecurity Into a Serious 'Game of Threats' Image

<b><i>Online Extra</b></i> Turning Cybersecurity Into a Serious 'Game of Threats'

Rebekah Mintzer

The last few years have seen some creative new methods of getting businesses engaged in protecting their networks and data. PricewaterhouseCoopers has created a cybersecurity computer game. PwC's 'Game of Threats' walks businesspeople, playing either as a team of nefarious hackers or as a company being attacked, through the important decisions they have to make during a breach, in hopes of giving them a deeper knowledge of cybersecurity and its challenges.

Features

Viacom and Google Defeat Privacy Claims over Kids' Online Data Image

Viacom and Google Defeat Privacy Claims over Kids' Online Data

Charles Toutant

A federal judge in Newark dismissed multidistrict litigation against Google Inc. and Viacom Inc. in rejecting claims that the companies' online data collection violates the privacy of children under 13.

Features

Laying a Foundation for Integrated e-Discovery Systems Image

Laying a Foundation for Integrated e-Discovery Systems

Josh Alpern, James FitzGerald & Jim Mittenthal

Typically, the production of data in litigation involves a series of disconnected actions involving several corporate or cloud-based systems. These disassociated e-discovery activities ' identify, preserve, collect, and track (IPCT) ' are then feed into a downstream set of processing, review, and production (PRP) steps often hosted outside the corporate firewall. Fortunately, technology advances are helping counsel and client alike to integrate systems and streamline processes both inside and across the firewall.

Features

e-Commerce Website Methods Are Patent Eligible Image

e-Commerce Website Methods Are Patent Eligible

Clyde Shuman

On Dec. 5, 2014, a divided Federal Circuit panel held that claims directed to systems and methods of generating a composite Web page combining certain visual elements of a "host" website with content of a third-party merchant were "necessarily rooted in computer technology in order to overcome a problem specifically arising in the realm of computer networks," and, therefore, were patent-eligible. However, the court cautioned that not all claims addressing Internet-centric challenges are patent-eligible.

Columns & Departments

Net News Image

Net News

ALM Staff & Law Journal Newsletters

In This Facebook Threats Case, No Wait for High Court <br>Judge Gives Go-Ahead To Facebook Privacy Suit<br>Appeals Court: No Privacy for Facebook Photo In Slip-and-Fall Case

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›