Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Law Firms and Social Networking

Paula Campbell

Along with the viral popularity of social networking Web sites (one of these sites is the fourth most-trafficked Web site in the world), legal blogs, collaboration sites, and informal online education options comes the vulnerability of some risk.

Features

Franchise Companies vs. Hackers: Twenty Questions on Cybercrime

Henfree Chan & Bruce S. Schaeffer

The 21st century is clearly the age of cybercrime, and franchise companies should be especially concerned because, simplistically, there are only two types of computer systems: those that have been hacked, and those that will be hacked.

Features

Technology Puts a Dream House on Hold

David Horrigan

A look at <i>A.E., Inc. v. Goodyear Tire and Rubber Co., Inc.</i>, No. 05-CV-01317 (D. Colo. 2007), in which visual technology paid a major part in the trail.

Features

The Golden Rule of Biological Inventions And the Written Description Requirement

Stefan M. Miller

In an ideal world, a business would have a patent practitioner everywhere at once: in the lab, in the office, and in the boardroom. The purpose of this article is to interpret a sphere of patent law related to the description of biological inventions in terms that are practical for researchers and business managers in the biotech industry who live in a non-ideal world.

Features

Curbing Internet Defamation

Jonathan Bick

An identifiable Internet speaker who sends an unlawful e-mail or posts an unlawful Internet message is subject to traditional litigation tactics. However, countless Internet speakers are not effortlessly identifiable. Hence, novel technical, administrative law and litigation tactics are advantageous for successfully curbing Internet defamation.

Features

What's in a Domain Name? The Changing Internet

Stephen Meyers

Generic, top-level domain names (gTLDs), such as .com or .net, are the sorters of the Internet. They serve the single purpose of identifying the database in which a domain name is registered. Last June, ICANN reversed its long-held position and announced that it would allow an unlimited number of generic top-level domains.

Features

Online Anti-Porn Law Dies at Supreme Court

Samuel Fineman

A federal law intended to restrict children's access to Internet pornography died quietly last month at the U.S. Supreme Court, more than 10 years after Congress overwhelmingly approved it. The Supreme Court rejected U.S. government prosecutors' last-ditch defense of COPA without comment, meaning that the law will not be enforced.

Features

RIAA Tempers Tactics

Eric R. Chad & William D. Schultz

In December, the RIAA announced that it would no longer look to file suit against individual file sharers and instead form relationships with ISPs that maintain the online accounts of the consumers.

Features

Listen Up: What the Discoverability of Audio Recordings Should Mean to IT Professionals

Michael Swarz

The necessity for IT professionals to haul audio recordings into their general e-discovery process is gaining awareness because of situations that may ' at first glance ' appear harmless.

Features

Empower Your Browser: New Possibilities

Brett Burney

The Web browser has evolved into a platform for our digital lives, offering more interactivity while moving further beyond its passive browsing roots (i.e., checking e-mail, paying bills and balancing checkbooks, watching videos, social networking, playing games, networking and even managing a law practice). That is precisely the core of Google's new Web browser called Chrome.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Surveys in Patent Infringement Litigation: The Next Frontier
    Most experienced intellectual property attorneys understand the significant role surveys play in trademark infringement and other Lanham Act cases, but relatively few are likely to have considered the use of such research in patent infringement matters. That could soon change in light of the recent admission of a survey into evidence in <i>Applera Corporation, et al. v. MJ Research, Inc., et al.</i>, No. 3:98cv1201 (D. Conn. Aug. 26, 2005). The survey evidence, which showed that 96% of the defendant's customers used its products to perform a patented process, was admitted as evidence in support of a claim of inducement to infringe. The court admitted the survey into evidence over various objections by the defendant, who had argued that the inducement claim could not be proven without the survey.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›