Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Transmission Claims Under the Computer Fraud and Abuse Act Image

Transmission Claims Under the Computer Fraud and Abuse Act

Richard Raysman

Given the allure of robust remedies in federal court, companies routinely plead CFAA unauthorized access claims ' in addition to state law causes of action for misappropriation and breach of contract ' against former employees who seek a competitive edge through the use of information misappropriated from their former employer's computer network.

Features

CA Ruling Backs e-Tailers Image

CA Ruling Backs e-Tailers

Scott Graham

The California Supreme Court ruled 4-3 on Feb. 4 that the Legislature never intended to apply the Song-Beverly Credit Card Act of 1971 to e-commerce, meaning that retailers can take addresses and telephone numbers when conducting remote credit card transactions.

Features

The Role of Supplemental Examination Image

The Role of Supplemental Examination

Anthony J. Lombardi

Considering the provisions of supplemental examination and its contrasts with <i>ex parte</i> re-examination can help practitioners decide whether supplemental examination may benefit a particular patent.

Features

Cybersecurity Report Spotlights Risks to U.S. Business from China Image

Cybersecurity Report Spotlights Risks to U.S. Business from China

Sue Reisinger

Mandiant, a Virginia-based cybersecurity firm, gave America a wake-up slap across the face last month by detailing how Chinese military hackers are infiltrating U.S. companies. And on Feb. 20, President Barack Obama's administration responded by announcing a broad plan to fight the cyber theft of trade secrets that included diplomatic pressure to discourage it.

Features

Patentable Software: Will We Know It When We See It? Image

Patentable Software: Will We Know It When We See It?

Christopher TL Douglas

As the pressure mounts and public concern rises, we await further clarification, by Supreme Court or congressional action, as to whether software is patent eligible. In the meantime, patent applicants should hedge against any potential outcome by drafting applications having claim sets that attempt to comply with future adoptable patent eligibility tests.

Features

Pressure Points: How to Move Forward Successfully with Technology Leasing Image

Pressure Points: How to Move Forward Successfully with Technology Leasing

Scott McFetters & Marc Cram

With the possibility of limited capital expenditures, financing technological advances will certainly be a way to stay within budget constraints and allow firms to continue investing in the latest and greatest technological trends. Leasing is one financing option that a firm can use to cut the out of pocket costs for technology upgrades and still be able to implement new projects by providing a monthly expense versus a total cost purchase.

Features

Smart Design Accommodates the Smartphone and Tablet User Image

Smart Design Accommodates the Smartphone and Tablet User

John Simpson

We know that clients ' and potential clients ' are using mobile devices to view law firm websites. But do you know how each format can alter your site's appearance ' and how to maximize users' experience, no matter what device they're using?

Features

Factors in Assessing Statutory Damages for Digital Copyright Infringement Image

Factors in Assessing Statutory Damages for Digital Copyright Infringement

Stan Soocher

A recent federal district court award of $6.6 million in statutory damages to music publishers for the unlicensed use of song lyrics by the website LiveUniverse and its operator was hailed as the first of its type for owners of song lyrics, and thus a significant milestone for content owners in the digital era.

Features

FTC Closes Google Inquiry Image

FTC Closes Google Inquiry

Jenna Greene

The FTC closed its inquiry, requiring Google to license patents that are essential to the interoperability of electronic devices but securing minimal agreements on what many viewed as the heart of the case: Google's dominance in the search market.

Features

Devices, Tablets and Breaking Traditions Image

Devices, Tablets and Breaking Traditions

John Simpson

The Internet has changed immensely since its creation. What was once only accessible through a dial-up modem on a large desktop computer is now available wirelessly with the touch of a finger. Smartphones, tablets, e-readers and gaming systems have all entered the mix as the next generation of computers, and they have transformed our online experiences in a multitude of ways. As the number of mobile Internet-connected devices continues to increase, so will the traffic they generate to law firm websites.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The 'Sophisticated Insured' Defense
    A majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.
    Read More ›
  • Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric Code
    In an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.
    Read More ›