Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Centralizing Stores of Information to Make Retention Policies Possible Image

Centralizing Stores of Information to Make Retention Policies Possible

Eric Mosca

Most law firms understand the need to plan for the implementation of records retention policies, but there has been little agreement on how to achieve this goal. Firms are acutely aware of the rising costs associated with storing physical data and the burden surrounding backup, maintenance and migration of electronic content. When faced with the need to produce information, be it at a client request or when compelled by a court, the more control a firm has over its data, the more efficient and cost effective this process will be.

Features

Democratizing the Social Networks Image

Democratizing the Social Networks

Harry A. Valetk

Social networking Web sites are hubs of information. Information about our daily activities, the people we know and the people they know. But as these hubs become more than just a virtual place for the global community to link to friends and post "what you are doing right now," we are confronted with fascinating new questions about how we define personal space, disclosures, and express preferences about our own content.

Features

Rules Governing Fax and E-mail Ads Image

Rules Governing Fax and E-mail Ads

James H. Laskey, Fernando M. Pinguelo, & Andrew D. Linden

The importance of having a robust compliance policy to review the content of proposed advertisements is well-known and widely accepted. But what may not be as familiar is the need for a separate policy focused on the means of disseminating such advertising.

Features

Keeping Track of Telecommuters Image

Keeping Track of Telecommuters

Erik Sherman

By restricting telecommuting to the people who really need to work at home and then asking them to sign a form indicating that they know the types of monitoring in use, a company can take reasonable protections without entering an Orwellian environment ' and making life hell for managers.

Features

Cloud Computing Image

Cloud Computing

Nolan M. Goldberg & Sharada Devarasetty

It would be hard to find an IT department of a large business that was not undertaking a "cloud computing" project or at least considering the idea. Here's a look at what it is and how it works.

Features

The Law Enforcement Response to the Financial Crisis Image

The Law Enforcement Response to the Financial Crisis

Mark K. Schonfeld

As the financial crisis has deepened, the pressure for prosecutions from politicians, the media and the public has grown. In turn, federal and state law enforcement and regulatory agencies have devoted vast resources to investigating the crisis.

Features

e-Commerce Docket Sheet Image

e-Commerce Docket Sheet

ALM Staff & Law Journal Newsletters

QVC to Pay $7.5 Million to Settle Charges That It Aired Deceptive Claims <br>Credit Repair Companies Charged with Deceiving Consumers

Features

e-Commerce Companies v. Hackers Image

e-Commerce Companies v. Hackers

Henfree Chan & Bruce S. Schaeffer

The 21st century is clearly the age of cybercrime, and e-commerce companies of all stripes should be especially concerned because there are only two types of computer systems: those that have been hacked, and those that will be hacked.

Features

Defending Against Trade Secret Misappropriation Lawsuits Image

Defending Against Trade Secret Misappropriation Lawsuits

J. T. Westermeier

There are several often-overlooked strategies for defending against trade-misappropriation claims. The first I call the Trade Secret Per Se Doctrine. The second pertains to open-source software. Both of these strategies need to be fully considered in appropriate trade-secret misappropriation cases, to which e-commerce counsel are no strangers.

Features

Lawful Data-Mining of Social Networks Image

Lawful Data-Mining of Social Networks

Jonathan Bick

Blogs simultaneously provide Internet users with social-network prospects and employers with a previously unavailable source of information suitable for employment-assessment decisions. And it's in this intersection on the Information Superhighway where often occurs a collision of worlds, perspectives and direction that frequently cripples or kills prospects, and individuals' aspirations. Employees of e-commerce companies aren't immune to such collisions, nor are agents of the companies who gather data on prospective or current employees, if they go about their work unlawfully, or in other improper ways that could lead to legal or other types of regulatory action.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Legal Possession: What Does It Mean?
    Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›