Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Centralizing Stores of Information to Make Retention Policies Possible Image

Centralizing Stores of Information to Make Retention Policies Possible

Eric Mosca

Most law firms understand the need to plan for the implementation of records retention policies, but there has been little agreement on how to achieve this goal. Firms are acutely aware of the rising costs associated with storing physical data and the burden surrounding backup, maintenance and migration of electronic content. When faced with the need to produce information, be it at a client request or when compelled by a court, the more control a firm has over its data, the more efficient and cost effective this process will be.

Features

Democratizing the Social Networks Image

Democratizing the Social Networks

Harry A. Valetk

Social networking Web sites are hubs of information. Information about our daily activities, the people we know and the people they know. But as these hubs become more than just a virtual place for the global community to link to friends and post "what you are doing right now," we are confronted with fascinating new questions about how we define personal space, disclosures, and express preferences about our own content.

Features

Rules Governing Fax and E-mail Ads Image

Rules Governing Fax and E-mail Ads

James H. Laskey, Fernando M. Pinguelo, & Andrew D. Linden

The importance of having a robust compliance policy to review the content of proposed advertisements is well-known and widely accepted. But what may not be as familiar is the need for a separate policy focused on the means of disseminating such advertising.

Features

Keeping Track of Telecommuters Image

Keeping Track of Telecommuters

Erik Sherman

By restricting telecommuting to the people who really need to work at home and then asking them to sign a form indicating that they know the types of monitoring in use, a company can take reasonable protections without entering an Orwellian environment ' and making life hell for managers.

Features

Cloud Computing Image

Cloud Computing

Nolan M. Goldberg & Sharada Devarasetty

It would be hard to find an IT department of a large business that was not undertaking a "cloud computing" project or at least considering the idea. Here's a look at what it is and how it works.

Features

The Law Enforcement Response to the Financial Crisis Image

The Law Enforcement Response to the Financial Crisis

Mark K. Schonfeld

As the financial crisis has deepened, the pressure for prosecutions from politicians, the media and the public has grown. In turn, federal and state law enforcement and regulatory agencies have devoted vast resources to investigating the crisis.

Features

e-Commerce Docket Sheet Image

e-Commerce Docket Sheet

ALM Staff & Law Journal Newsletters

QVC to Pay $7.5 Million to Settle Charges That It Aired Deceptive Claims <br>Credit Repair Companies Charged with Deceiving Consumers

Features

e-Commerce Companies v. Hackers Image

e-Commerce Companies v. Hackers

Henfree Chan & Bruce S. Schaeffer

The 21st century is clearly the age of cybercrime, and e-commerce companies of all stripes should be especially concerned because there are only two types of computer systems: those that have been hacked, and those that will be hacked.

Features

Defending Against Trade Secret Misappropriation Lawsuits Image

Defending Against Trade Secret Misappropriation Lawsuits

J. T. Westermeier

There are several often-overlooked strategies for defending against trade-misappropriation claims. The first I call the Trade Secret Per Se Doctrine. The second pertains to open-source software. Both of these strategies need to be fully considered in appropriate trade-secret misappropriation cases, to which e-commerce counsel are no strangers.

Features

Lawful Data-Mining of Social Networks Image

Lawful Data-Mining of Social Networks

Jonathan Bick

Blogs simultaneously provide Internet users with social-network prospects and employers with a previously unavailable source of information suitable for employment-assessment decisions. And it's in this intersection on the Information Superhighway where often occurs a collision of worlds, perspectives and direction that frequently cripples or kills prospects, and individuals' aspirations. Employees of e-commerce companies aren't immune to such collisions, nor are agents of the companies who gather data on prospective or current employees, if they go about their work unlawfully, or in other improper ways that could lead to legal or other types of regulatory action.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›