Account

Sign in to access your account and subscription

Regulation

  • Social networking Web sites are hubs of information. Information about our daily activities, the people we know and the people they know. But as these hubs become more than just a virtual place for the global community to link to friends and post "what you are doing right now," we are confronted with fascinating new questions about how we define personal space, disclosures, and express preferences about our own content.

    March 30, 2009Harry A. Valetk
  • The importance of having a robust compliance policy to review the content of proposed advertisements is well-known and widely accepted. But what may not be as familiar is the need for a separate policy focused on the means of disseminating such advertising.

    March 30, 2009James H. Laskey, Fernando M. Pinguelo, and Andrew D. Linden
  • In a little publicized section of the Consumer Product Safety Improvement Act of 2008 ("2008 Act"), employees in virtually every corner of the consumer products industry were given the right to file lawsuits claiming their employer retaliated against them for having raised consumer product safety concerns.

    March 30, 2009Scott E. Gross
  • A recent decision by a New York State appeals court has provided employers with yet another reason to verify scrupulously the documents provided to it by potential employees.

    March 30, 2009Mark N. Reinharz
  • With ever widening budget deficits and economic limitations on raising taxes, the IRS will go in the only direction it can, that is, to mine the "tax gap" ' the difference between the taxes that should have been collected under current law and those that actually are collected.

    March 30, 2009Steven Toscher and Dennis Perez
  • As the financial crisis has deepened, the pressure for prosecutions from politicians, the media and the public has grown. In turn, federal and state law enforcement and regulatory agencies have devoted vast resources to investigating the crisis.

    March 30, 2009Mark K. Schonfeld
  • The 21st century is clearly the age of cybercrime, and e-commerce companies of all stripes should be especially concerned because there are only two types of computer systems: those that have been hacked, and those that will be hacked.

    March 30, 2009Henfree Chan and Bruce S. Schaeffer
  • There are several often-overlooked strategies for defending against trade-misappropriation claims. The first I call the Trade Secret Per Se Doctrine. The second pertains to open-source software. Both of these strategies need to be fully considered in appropriate trade-secret misappropriation cases, to which e-commerce counsel are no strangers.

    March 30, 2009J. T. Westermeier