Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

<b><i>Online Extra</b></i>Browsewrap Agreements Not Vehicles for Abritration Clauses Image

<b><i>Online Extra</b></i>Browsewrap Agreements Not Vehicles for Abritration Clauses

Marlisse Silver Sweeney

Arbitration clauses hidden in website terms of use agreements are not enforceable.

Features

<i><b>Online Extra:</i></b>Facebook Fights to Snuff Out Privacy Suit Image

<i><b>Online Extra:</i></b>Facebook Fights to Snuff Out Privacy Suit

Ross Todd

U.S. District Judge Phyllis Hamilton was set last month to be the latest jurist in the Northern District of California to grapple with how decades-old federal wiretapping laws apply to today's technology.

Features

Courts Conflict on Anonymous, Allegedly Defamatory Online Speech Image

Courts Conflict on Anonymous, Allegedly Defamatory Online Speech

Richard Raysman & Peter Brown

Anyone spending 10 minutes on the Internet reading content is often assaulted by angry and coarse language supporting frequently outrageous opinions. The First Amendment concepts of free speech have reached either new highs or discouraging lows when dealing with opinions and blogs on the Internet. In this unrestricted environment, can individuals or businesses protect their reputations?

Features

Word 2013: Better by Design Image

Word 2013: Better by Design

Jeffrey Roach

Hey, wanna know the one rule for a flat stomach? How about the secret $5 wrinkle buster? Spoiler: There is no one rule or $5 secret. But it must be part of the human condition to seek out quick solutions to thorny problems because people keep clicking these ads. This trickles into my little corner of the "teaching Office 2013" world through a seemingly harmless question: Should I turn that off?

Features

Data Breaches and Insurance Coverage Image

Data Breaches and Insurance Coverage

Ellen Farrell & Kathryn Linsky

With the modern technology that allows businesses to do more things on computers and on other electronic devices, efficiencies can be achieved, but unintended negative consequences can also result. When a breach of the data on these devices occurs and confidential information is accessed by unauthorized persons, the financial consequences to the business entity may be substantial.

Features

Privacy Ruling Reverberates in Case Against Facebook Image

Privacy Ruling Reverberates in Case Against Facebook

Marisa Kendall

Plaintiffs suing Facebook over its alleged practice of scanning direct messages are invoking a recent ruling from U.S. District Judge Lucy Koh clearing the way for a similar case against Yahoo Inc.

Features

Obstruction of (Contemplated) Justice Image

Obstruction of (Contemplated) Justice

Jeffrey M. Hanna

Obstruction of justice is seeing increased use, and could prove to be a powerful tool in the federal prosecutor's toolbox. Reflective of its growing attention, as discussed further below, it is the subject of a pending U.S. Supreme Court case that will examine just how broadly this statute may reach.

Features

Collecting Social Security Numbers Image

Collecting Social Security Numbers

Nicole Pszczolkowski & L. Elise Dieterich

In the first half of 2014, at least 96 significant data breaches were reported, compromising more than 2.2 million records. Of these breaches, at least 46 involved records that may have contained Social Security Numbers (SSNs). What the affected businesses may not know is that the mere collection of SSNs may have put them in violation of state laws, in addition to the liability they may now face for having failed to protect the SSN information.

Features

Supreme Court Misses Chance to Address Difficult Privacy Question Image

Supreme Court Misses Chance to Address Difficult Privacy Question

Leonard Deutchman

When technology changes the nature of what has been thought of as private, should the response be to continue to recognize that privacy, or to rethink what is private?

Features

Cost Savings As a Risk Management Strategy Image

Cost Savings As a Risk Management Strategy

Nina Cunningham

Since the active use of the term <i>risk management</i>, perhaps sometime in the 1980s, I have thought of the confluence of <i>risk</i> and <i>management</i> as an oxymoron.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Anti-Assignment Override Provisions
    UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›