Features

UMG v. Grande Communications: Another Victory for the Music Industry in Its Battle to Hold ISPs Liable for Peer-to-Peer File Sharing
Since the advent of the Internet, the music industry has been in a pitched battle to combat online piracy. Initially, the industry focused on shutting down services that offered peer-to-peer or other similar platforms, such as Napster, Aimster and Grokster. For a time, the industry also focused on filing claims against individual infringers to dissuade others from engaging similar conduct. In recent years, the industry seems to have shifted focus toward Internet Service Providers.
Features

Marketing Tech: Why Should Marketers Care About the Blockchain?
Technology is playing an ever-increasing role in our lives, personally and professionally. One of the emerging technologies that has caught my eye is blockchain.
Features

When Alice Leaves Software in Wonderland: Review the Terms of Use
That least-read contract — the Terms of Use — can be an effective (albeit the last) weapon in the arsenal of a company trying to protect unpatented software technology while providing on-line services.
Features

2019 Trends Overview: Compliance, Privacy and Security Family Tree
In 2019, regulations and laws will continue to define how businesses collect and use consumer data, and their obligations to protect this data from misuse, theft or exposure to unauthorized parties.
Features

Causation and Harm In Data Breach Litigation
Demonstrating that a data breach has resulted in an injury-in-fact can be difficult, because it is not always clear what has happened or will happen with the stolen data.
Features

Implications of GDPR & CCPA on Public Records
This article discusses the importance of securing a safe harbor for court records through reviewing an illustrative example of how a European Union (EU) citizen was able to force U.S. legal technology companies to remove and alter court records using GDPR.
Features

Legal Operations Chiefs Say Managing Technology and Cutting Costs Are Main Priorities, Not Blockchain or AI
In-house legal operations chiefs see their main priorities as managing legal technology and cost-cutting, primarily on outside counsel spending. Blockchain remains a confusing concept to them, while artificial intelligence is the hottest topic of conversation.
Features

'Dark Overlord' Hack Shows Mounting Cyber Risks for Law Firms
<b><i>The Hacker Group Wants Ransom Payments from Dozens of Firms Involved In the Sept. 11 Litigation, and Experts Warn That More Attacks Are Coming</b></i><p>Leaders of those law firms are all likely scratching their heads about how to handle a recent announcement from a nebulous hacker entity calling itself the “Dark Overlord,” which claims to be in possession of 18,000 legal and insurance documents pertaining to the court fight.
Features

Digital Dive: How to Create (at least) Nine Pieces of Content in One Hour
In just one hour, would it be valuable to have at least nine pieces of content that your lawyer clients may use on your website and on social media?
Features

Sticking a Hand in the Internet Cookie Jar
As convenient, useful and cool mobile technology and interconnected devices are, they come with risks that remain largely unseen or, worse, ignored. Some…
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- Legal Possession: What Does It Mean?Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›