Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Benefits and Risks of the Internet of Things Image

Benefits and Risks of the Internet of Things

L. Elise Dieterich

The buzz phrase "Internet of Things" is seemingly everywhere. What is it, what can it do for us, and what concerns does it present? More specifically, while the Internet of Things (IoT) presents tremendous opportunities for businesses, are there corresponding risks, or elements of the IoT that businesses should consider staying away from?

Features

<b><i>Online Extra:</b></i> Google Defeats Oracle in $9 Billion Copyright Case Image

<b><i>Online Extra:</b></i> Google Defeats Oracle in $9 Billion Copyright Case

Ross Todd

A San Francisco federal jury has sided with Google Inc. in its copyright clash with Silicon Valley rival Oracle Corp.

Features

<b><i>Online Extra:</b></i> Facebook Sued Over Texts to Recycled Cell Numbers Image

<b><i>Online Extra:</b></i> Facebook Sued Over Texts to Recycled Cell Numbers

Facebook Inc. was hit with a class action suit claiming the company sends spam text messages to people who get assigned cellphone numbers that used to belong to Facebook users.

Features

EXCITING NEWS!!! Image

EXCITING NEWS!!!

Beginning with the June Issue, <i>LJN's Legal Tech Newsletter</i> will be incorporated into our all-new, cutting-edge title: <i>Cybersecurity Law &amp; Strategy.</i>

Features

Beware 'Spoofed' E-Mails Image

Beware 'Spoofed' E-Mails

Law firms, companies and other entities need to be on guard for an increasingly frequent, sophisticated online fraud that uses "spoofed" e-mails.

Features

Quality Control Of Trademarks in Social Media Image

Quality Control Of Trademarks in Social Media

Catherine J. Holland

Trademark licensors, including those in the entertainment industry, are scrambling to keep up with the evolving use of social media as a tool for business advertising. As technology changes, so must the provisions in a trademark license.

Features

Cloud Computing Security: More Opportunity, Less Threat Image

Cloud Computing Security: More Opportunity, Less Threat

David Hansen

If you follow the legal technology headlines you might have noticed that we've come full circle on cloud security. Rewind seven or so years, and mainstream cloud computing adoption was being thwarted by grave concerns about data security, data governance and data access. As the cloud became more pervasive in many industries globally, the legal market took note and slowly but surely more law firms went to the cloud.

Features

EU Approves GDPR Image

EU Approves GDPR

Coming off the heels of the EU Article 29 Working Party Opinion on the Privacy Shield, the EU Parliament passed the General Data Protection Regulation (GDPR) on April 15, which overhauls the union's Data Protection Directive rules set forth in 1995. This regulation applies to all business and organizations targeting EU consumers, regardless of their geographic location.

Features

Law Firms Grapple With Cybersecurity Issues and Regulatory Risks Image

Law Firms Grapple With Cybersecurity Issues and Regulatory Risks

Joe Kelly

Security is always a concern for law firms, and the risks have only grown in recent years. Increasingly, attorneys, staff and clients have become more mobile and rely on an array of laptops, smartphones and tablets to stay connected 24/7. As more data is created and resides in more places, it becomes more vulnerable.

Features

Admissibility of Evidence Obtained From Facebook Image

Admissibility of Evidence Obtained From Facebook

Michael J. Hutter

This article addresses the four major evidentiary hurdles ' relevance, authentication, hearsay, and best evidence ' that must be overcome to admit Facebook posts claimed to be posted by the owner, whether it be the profile page, or a posted message, photograph or video, when offered against the claimed owner.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›