Features
Centralizing Stores of Information to Make Retention Policies Possible
Most law firms understand the need to plan for the implementation of records retention policies, but there has been little agreement on how to achieve this goal. Firms are acutely aware of the rising costs associated with storing physical data and the burden surrounding backup, maintenance and migration of electronic content. When faced with the need to produce information, be it at a client request or when compelled by a court, the more control a firm has over its data, the more efficient and cost effective this process will be.
Features
Democratizing the Social Networks
Social networking Web sites are hubs of information. Information about our daily activities, the people we know and the people they know. But as these hubs become more than just a virtual place for the global community to link to friends and post "what you are doing right now," we are confronted with fascinating new questions about how we define personal space, disclosures, and express preferences about our own content.
Features
Rules Governing Fax and E-mail Ads
The importance of having a robust compliance policy to review the content of proposed advertisements is well-known and widely accepted. But what may not be as familiar is the need for a separate policy focused on the means of disseminating such advertising.
Features
Keeping Track of Telecommuters
By restricting telecommuting to the people who really need to work at home and then asking them to sign a form indicating that they know the types of monitoring in use, a company can take reasonable protections without entering an Orwellian environment ' and making life hell for managers.
Features
Cloud Computing
It would be hard to find an IT department of a large business that was not undertaking a "cloud computing" project or at least considering the idea. Here's a look at what it is and how it works.
Features
The Law Enforcement Response to the Financial Crisis
As the financial crisis has deepened, the pressure for prosecutions from politicians, the media and the public has grown. In turn, federal and state law enforcement and regulatory agencies have devoted vast resources to investigating the crisis.
Features
e-Commerce Docket Sheet
QVC to Pay $7.5 Million to Settle Charges That It Aired Deceptive Claims <br>Credit Repair Companies Charged with Deceiving Consumers
Features
e-Commerce Companies v. Hackers
The 21st century is clearly the age of cybercrime, and e-commerce companies of all stripes should be especially concerned because there are only two types of computer systems: those that have been hacked, and those that will be hacked.
Features
Defending Against Trade Secret Misappropriation Lawsuits
There are several often-overlooked strategies for defending against trade-misappropriation claims. The first I call the Trade Secret Per Se Doctrine. The second pertains to open-source software. Both of these strategies need to be fully considered in appropriate trade-secret misappropriation cases, to which e-commerce counsel are no strangers.
Features
Lawful Data-Mining of Social Networks
Blogs simultaneously provide Internet users with social-network prospects and employers with a previously unavailable source of information suitable for employment-assessment decisions. And it's in this intersection on the Information Superhighway where often occurs a collision of worlds, perspectives and direction that frequently cripples or kills prospects, and individuals' aspirations. Employees of e-commerce companies aren't immune to such collisions, nor are agents of the companies who gather data on prospective or current employees, if they go about their work unlawfully, or in other improper ways that could lead to legal or other types of regulatory action.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- The Cost of Making PartnerMaking partner isn't cheap, and the cost is more than just the years of hard work and stress that associates put in as they reach for the brass ring.Read More ›