Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Accidental Access, 'Catfishing' and Unsecured Wi-Fi Image

Accidental Access, 'Catfishing' and Unsecured Wi-Fi

Richard Raysman & Peter Brown

The increasing use of Web browsing and other user data has stirred some users to reconsider the unspoken "bargain" that exists on social media and other interactive websites, namely, that privacy sacrifices in the form of targeted marketing and data collection subsidize free content and services and promote a robust online ecosystem. However, beyond the larger debate over digital privacy, new practices and technologies have emerged that do not neatly fit within the boundaries of existing privacy laws.

Features

Recent Issues in Cybersquatting Disputes Image

Recent Issues in Cybersquatting Disputes

Richard Raysman & Peter Brown

There are several pressing issues within the realm of cybersquatting, including: recent heightened scrutiny applied by courts to cybersquatters and the operators who host their domains; the various methods by which companies attempt to combat the problem; and whether cybersquatting will become a substantial problem on newer platforms, such as social networking sites and on the forthcoming new gTLDs.

Features

Spotlight on 3D Printing: Intellectual Property Image

Spotlight on 3D Printing: Intellectual Property

Julie N. Matthews

3D printing technology, also known as additive manufacturing, is nothing new. It has been used for decades by designers and engineers. But the technical capabilities that make 3D printing technologies so useful likely will facilitate intellectual property infringement.

Features

Maddeningly Mismated Matches Image

Maddeningly Mismated Matches

Jonathan Moskin

In paired opinions rendered the same day by the same judge, the Ninth Circuit reached seemingly directly contrary conclusions in virtually identical cases concerning the balancing of intellectual property rights and First Amendment interests.

Features

FACE Act Introduced Image

FACE Act Introduced

Bradley S. Shear

The Forbidding Advertisement Through Child Exploitation Act (FACE Act) of 2013 was introduced in Congress on July 10, 2013 by U.S. Congressman John J. Duncan, Jr. (R-N) to help protect the personal privacy of children and teens.

Features

Forensic and e-Discovery Tools to Help Win Your Case Image

Forensic and e-Discovery Tools to Help Win Your Case

Richard D. Lutkus

Winning or losing your client's case often rests on your ability to prove facts that support your client's position. Subject-matter expert witnesses play a prominent role in interpreting the facts available to them and helping the trier of fact reach a conclusion on the meaning of such information. Forensic and e-discovery experts are no different than any other experts in that their opinions can only be as solid as the information they can find and analyze.

Features

FTC Warns Big Data Companies on Consumer Privacy Image

FTC Warns Big Data Companies on Consumer Privacy

Andrew Ramonas

Federal Trade Commission Chairwoman Edith Ramirez last month issued a stern warning to U.S. companies that house vast amounts of consumers' personal data: Watch out.

Features

Open Source Code Attribution in a Remix World Image

Open Source Code Attribution in a Remix World

Alexandra Lyn

The landscape of software development and distribution is changing. Traditionally a closed-off proprietary process, developers and businesses alike are quickly realizing the many advantages that flow from the adoption of a more collaborative open source approach.

Features

Your Business: Someone Online Hates You Image

Your Business: Someone Online Hates You

Josh King

As word of mouth moves online, lawyers occupy the same place today that hotels were in a decade ago: just starting to face the prospect of widespread use of online user reviews, and concerned that such reviews will crater their businesses. The following 10 tips will put these concerns into context and explore which methods of responding to negative feedback are effective and ethical and which ones aren't.

Features

e-Mail Troll Hushed Image

e-Mail Troll Hushed

Ari N. Rothman

A federal judge recently ruled that an Internet service provider is barred from pursuing claims for alleged violations of the California and Maryland anti-spam statutes because it existed primarily and substantially to collect e-mails it believed to be spam and sue over it, and because it consented to receive the e-mails over which it sues.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The 'Sophisticated Insured' Defense
    A majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.
    Read More ›
  • Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric Code
    In an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.
    Read More ›