Features
Benefits and Risks of the Internet of Things
The buzz phrase "Internet of Things" is seemingly everywhere. What is it, what can it do for us, and what concerns does it present? More specifically, while the Internet of Things (IoT) presents tremendous opportunities for businesses, are there corresponding risks, or elements of the IoT that businesses should consider staying away from?
Features
<b><i>Online Extra:</b></i> Google Defeats Oracle in $9 Billion Copyright Case
A San Francisco federal jury has sided with Google Inc. in its copyright clash with Silicon Valley rival Oracle Corp.
Features
<b><i>Online Extra:</b></i> Facebook Sued Over Texts to Recycled Cell Numbers
Facebook Inc. was hit with a class action suit claiming the company sends spam text messages to people who get assigned cellphone numbers that used to belong to Facebook users.
Features
EXCITING NEWS!!!
Beginning with the June Issue, <i>LJN's Legal Tech Newsletter</i> will be incorporated into our all-new, cutting-edge title: <i>Cybersecurity Law & Strategy.</i>
Features
Beware 'Spoofed' E-Mails
Law firms, companies and other entities need to be on guard for an increasingly frequent, sophisticated online fraud that uses "spoofed" e-mails.
Features
Quality Control Of Trademarks in Social Media
Trademark licensors, including those in the entertainment industry, are scrambling to keep up with the evolving use of social media as a tool for business advertising. As technology changes, so must the provisions in a trademark license.
Features
Cloud Computing Security: More Opportunity, Less Threat
If you follow the legal technology headlines you might have noticed that we've come full circle on cloud security. Rewind seven or so years, and mainstream cloud computing adoption was being thwarted by grave concerns about data security, data governance and data access. As the cloud became more pervasive in many industries globally, the legal market took note and slowly but surely more law firms went to the cloud.
Features
EU Approves GDPR
Coming off the heels of the EU Article 29 Working Party Opinion on the Privacy Shield, the EU Parliament passed the General Data Protection Regulation (GDPR) on April 15, which overhauls the union's Data Protection Directive rules set forth in 1995. This regulation applies to all business and organizations targeting EU consumers, regardless of their geographic location.
Features
Law Firms Grapple With Cybersecurity Issues and Regulatory Risks
Security is always a concern for law firms, and the risks have only grown in recent years. Increasingly, attorneys, staff and clients have become more mobile and rely on an array of laptops, smartphones and tablets to stay connected 24/7. As more data is created and resides in more places, it becomes more vulnerable.
Features
Admissibility of Evidence Obtained From Facebook
This article addresses the four major evidentiary hurdles ' relevance, authentication, hearsay, and best evidence ' that must be overcome to admit Facebook posts claimed to be posted by the owner, whether it be the profile page, or a posted message, photograph or video, when offered against the claimed owner.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›