Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Cisco Legal Increases Efficiency Image

Cisco Legal Increases Efficiency

Risa Schwartz

An ongoing challenge of Cisco Legal's priority to deliver value efficiently to its business customers is the need to facilitate intra- as well as inter-departmental collaboration with outside counsel and business partners and customers.

Features

Data Loss Prevention: A Concept in Motion Image

Data Loss Prevention: A Concept in Motion

Kandace Donovan

The current economic climate, along with portable devices and the mobility of today's workforce, has truly created the perfect storm ' exacerbating DLP issues and expanding the definition of DLP and related needs beyond the piecemeal technology offerings currently available. Preventative steps like ethical walls can easily be applied to stored data ' but data in use is the true risk to address.

Features

Twittering in Federal Court Image

Twittering in Federal Court

Lynne Marek

Some federal judges are opening the door to the press reporting directly from their courtrooms in the interest of bringing more transparency to the judicial process.

Features

Existing Internet Laws Reduce Constitutional Protections Image

Existing Internet Laws Reduce Constitutional Protections

Jonathan Bick

Internet communication necessitates sharing content and data with third parties. The voluntary transfer of such content and related data to third-party Internet communication facilitators reduces or eliminates First, Third, Fourth, Fifth and Fourteenth Amendment rights of Internet users. The technology and protocols used to enable Internet communication, as interpreted by existing privacy statutes and case law, further compromises Internet users' privacy and publicity rights. Both legal notices and technological techniques may be used to ameliorate this outcome.

Features

Trademark Protection in Cyberspace Rescued Image

Trademark Protection in Cyberspace Rescued

Norman C. Simon

A recent decision of the U.S. Court of Appeals for the Second Circuit, <i>Rescuecom Corp. v. Google Inc.</i>, has clarified precedent that had been assumed to foreclose Lanham Act challenges to the surreptitious use of trademarks to compete in cyberspace. In the wake of <i>Rescuecom</i>, that interpretation has been rejected, and advertisers have a potent weapon to protect their trademarks against unfair competition on the Web.

Features

Social Media Policies: Your Firm Needs One Image

Social Media Policies: Your Firm Needs One

Jay M. Jaffe

Being engaged in social networks has enormous value for your firm. Through them, you can establish thought leadership, find new recruits, provide a more efficient way for potential clients to find you online, and participate in and monitor discussions about the issues that impact your clients and your firm. The first thing you must do is create a social media policy ' or modify an existing policy that is free and available for you to borrow.

Features

Media & Communications Corner: Channel the Information Deluge into Knowledge You Can Use Image

Media & Communications Corner: Channel the Information Deluge into Knowledge You Can Use

Nicholas Gaffney

Proven shortcuts that will help you channel the flood of incessant information coming your way.

Features

The Little License That Could: Dangers of Using Open-Source Code After Jacobsen v. Katzer Image

The Little License That Could: Dangers of Using Open-Source Code After Jacobsen v. Katzer

Jonathan Moskin, Howard Wettan & Adam Turkel

Although the open-source movement has been active for more than a decade, it is only in recent months that such a copyright license actually has received the imprimatur of enforceability ' from an unlikely court (the Federal Circuit) construing a perhaps unlikely license (the Java Model Railroad Interface for model train software).

Features

Put Technology to Work for Your Firm Image

Put Technology to Work for Your Firm

Rebecca J. Mattick

Today's tough economy finds many firms searching for new ways to improve profitability by increasing leverage through the use of technology. Preserving a competitive edge is crucial and can mean the difference between success or failure. Investing in the right technology, and the efficient use thereof, could help your firm weather or even thrive during the tough times ahead.

Features

Is Your e-Communication Being Read? Image

Is Your e-Communication Being Read?

Nancy Roberts Linder

Any way you look at it, e-communication gives you and your firm exposure in an existing or potential client market. Unlike other communication delivery methods, e-communication is the one place a law firm can actually see specific results ' from who received the communication, to whether that person actually viewed the e-mail or forwarded it on to someone else.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›