Features
ISP Access to e-Mail Content Is Not Invasion of Privacy
An Internet Service Provider (ISP) can legally search the e-mail that it processes. ISPs may lawfully search the content of users' e-mails for many purposes, including assisting law enforcement, ensuring compliance with the ISP's terms-of-use agreement and protecting the ISP from legal difficulties, to name a few. Such activities do not currently constitute an invasion of the e-mail user's privacy.
Features
Companies and Lobbyists on Both Sides of SOPA
In mid-November, a number of corporations joined in the debate and lobbying over the Stop Online Piracy Act (SOPA), a new piece of legislation introduced in October by House Judiciary Committee chairman Lamar Smith (R-TX) that is being considered by that committee.
Features
Authentication of Social Media Evidence
Given the possibility of impersonation and digital fabrication in the online world, the information displayed on social media profiles is not immediately verifiable and presents issues of authentication and admissibility under the Federal Rules of Evidence.
Features
e-Tailing Doing Fine
Retail e-commerce activity was up ' barely ' in the third quarter from the second quarter of the year, the U.S. Census Bureau announced in mid-November in its four-times-a-year report of total and electronic-commerce retailing.
Features
Companies and Lobbyists on Both Sides of SOPA
In mid-November, a number of corporations joined in the debate and lobbying over the Stop Online Piracy Act (SOPA), a new piece of legislation introduced in October by House Judiciary Committee chairman Lamar Smith (R-TX) that is being considered by that committee.
Features
Best Practices for Social and Mobile Media As Privacy Laws Evolve
As social media and mobile devices and apps continue to proliferate in the corporate enterprise, and e-commerce firms rely evermore on these technologies to assist promotion and sales, these forms of collaboration and information-sharing are putting a new spin on compliance issues.
Features
Succession Planning for e-Commerce
Everyone in the tech economy mourned the recent passing of Apple cofounder Steve Jobs. Even in an era of sweeping technological change, his innovations disrupted many business models well beyond Apple's own product markets. But only time will tell if he properly handled a challenge that faces every entrepreneur: succession.
Features
Legal Issues in the Cloud
Increasingly popular, Cloud computing nevertheless raises new and challenging legal issues for both cloud computing users and vendors.
Features
The ESI Race Heats Up
It's probably not a stretch to say that e-mail has been the single biggest factor in the creation of the electronic discovery industry as we know it today. e-Mail has been seen as almost synonymous with e-discovery, in many ways to the detriment of other valuable forms of ESI. But, that race has tightened up.
Features
Understanding Cross-references In Word 2010
Cross-reference is a powerful tool in guiding your reader to specific locations in a document. When using the Cross-reference feature, always keep the reader in mind and create those references to make navigating throughout the document as straightforward as possible.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Strategic Uses of a Rule 2004 ExamWhile most bankruptcy practitioners are familiar with the basic concepts behind the Rule 2004 exam, some are less familiar with the procedural intricacies of obtaining, conducting, and responding to the exam ' intricacies that often involve practices and procedures adapted from civil discovery that are beyond the scope of pure bankruptcy practice. This article explains.Read More ›
- COVID-19: Economic Stimulus and SBA LoansA summary of information on the various provisions under the new federal economic stimulus package.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›