Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

The FTC's New Endorsement Guides Image

The FTC's New Endorsement Guides

Alan L. Friel

The FTC's new guidance makes it clear that companies that are involved in encouraging a message about their products or services in non-traditional media, such that they are essentially sponsoring the messages, even if by consumers or celebrities, will be responsible as the advertiser for the message. Although the FTC acknowledges the limited ability in social and other evolving media to clear and control these types of messages, it places the burden of the risk on both the sponsor and the speaker.

Features

Automating BlackBerry Support Across the IT Organization Image

Automating BlackBerry Support Across the IT Organization

Robert Holloway

As the firm's mobile users came to rely more heavily on their smartphones, small service issues began to occur that the IT support team could not quickly isolate.

Features

The Forgotten e-Mail Account Image

The Forgotten e-Mail Account

Janice G. Inman

As many matrimonial law practitioners know, New York's laws concerning eavesdropping and the admissibility of evidence obtained while doing so often keep very relevant information out of the courtroom. Herein is a discussion of what this means.

Features

Blogging Checklist Image

Blogging Checklist

Jennifer Topper

An integrated blog added to your online presence is certainly a consideration for any lawyer today looking to market his or her practice and/or firm. There are a handful of reasons why ' and why not ' to launch a blog.

Features

Five Reasons for Lawyers to Use Social Media Image

Five Reasons for Lawyers to Use Social Media

Evan Brown

This article recommends using social media for business and career development, and presents five non-exhaustive reasons why attorneys should consider using social media for themselves or for their firms. The <i>what</i> and <i>how</i> of blogging, Twitter, Facebook, etc., are beyond the scope of what is covered here. This discussion is about <i>why</i> a lawyer might want to use social media.

Features

TextMap Version 5: New Uses for a Familiar Tool Image

TextMap Version 5: New Uses for a Familiar Tool

Brett Burney

A bunch of loose nails can be pounded with a shoe or a rock, but why not buy a hammer so you have the right tool for the job? Similarly, a load of transcripts can be tagged with sticky flags and painstakingly summarized on a yellow legal pad, but why not use software to help you comprehensively manage and annotate them? TextMap 5 from LexisNexis (formerly CaseSoft) is the right tool for the job.

Features

Addressing Last-Minute Tables of Authorities and Contents Issues Image

Addressing Last-Minute Tables of Authorities and Contents Issues

Sue Hughes

I've seen too many files squeeze in right under a filing or courier deadline. Everything is in order, the document content, footnotes, citations, and your tables. Just prior to, or after clicking the final Save, Send or Print, the Table of Authorities ("TOA") and Table of Contents ("TOC") are updated: The tables fall apart, page numbering is incorrect, text mysteriously appears or disappears from within the table, and formatting takes on a whole new look (and not for the better). I don't see this scenario changing much. Last-minute edits are the nature of the beast. I won't even go into the frayed nerves! What can change is understanding why the tables "fell apart" in the first place, and how to get that file out the door in an acceptable format. You can worry about fixing the file at a later time.

Features

Enforceable Browse-Wrap Contracts Image

Enforceable Browse-Wrap Contracts

Jonathan Bick & Karen Berger

Doing business over the Internet is increasingly automated. In the past, Web sites used "terms of use" agreements which include an Internet mechanism to affirm consent to be bound by the agreement (click-wrap). Increasingly, browse-wrap agreements are replacing click-wrap agreements.

Features

Music Site Ruled Not 'Interactive' Enough Image

Music Site Ruled Not 'Interactive' Enough

Mark Hamblett

A Webcasting service that provides users with individualized Internet radio stations is not required to pay licensing fees to copyright holders of the songs the service plays, the Second U.S. Circuit Court of Appeals has ruled.

Features

Immunity for Web Site Owners Image

Immunity for Web Site Owners

Richard Raysman & Peter Brown

Web sites, social networks and other interactive service providers facilitate the display and exchange of a staggering amount of user-generated information, much of it idle chatter, meaningful commentary and helpful information, though some of it defamatory and offensive speech. Without certain protections, a site owner could face liability, and such a threat conceivably would have a chilling effect on the vibrant exchange of ideas on the Web.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›