Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


NLRB Again Limits <i>'Weingarten' </i>Rights
June 29, 2004
Continuing a seesaw battle that has been ongoing since the early 1980s, the NLRB recently held in a 3-2 decision that non-union employees do not have a right under the National Labor Relations Act to be accompanied by a fellow employee during a meeting that might lead to discipline.
Coordinating Complex Employment Litigation
June 29, 2004
In the past several years, employment class and collective action lawsuits have caught the attention of employees across the country. Many of these cases have resulted in multi-million dollar settlements or verdicts. Equally troubling, once an industry or corporation is viewed as potentially vulnerable on an issue, copycat cases may be brought in multiple jurisdictions against the same defendant or against others in the same industry.
National Litigation Hotline
June 29, 2004
Recent rulings of importance to you and your practice.
Recent Developments from Around the States
June 29, 2004
National cases of importance to your practice.
9th Circuit Snaps At Gator's Argument
June 29, 2004
An Internet company asked a skeptical 9th U.S. Circuit Court of Appeals in late June for the right to sue an East Coast business rival in Northern California, even though the rival has no physical presence in the California.
Spam Costs Double in Last Year
June 29, 2004
According to a new report from Nucleus Research, "Spam: The ROI Killer," the cost of spam per employee has skyrocketed to $1934 per year.
All Together Now: ISP Group Releases Spam-Fighting Measures
June 29, 2004
Leading Internet service providers (ISPs) say that the industry needs to work together and take proactive steps to stop the conflagration of unwanted e-mails. <br>The companies ' including leading e-mail providers and ISPs Yahoo!, EarthLink, Microsoft, Comcast and America Online (AOL) ' through the Anti-Spam Technical Alliance (ASTA), are calling on other ISPs to adopt a series of actions and policies that they have developed after a year of collaboration to fight spam.
Spyware Remains Elusive
June 29, 2004
Even 007 wasn't shadowed this much. These days, spyware operations are the most popular cybermarketing tool around ' and the most unpopular. Software designers and advertisers have joined forces to run a clandestine operation on millions of consumers across the country. The tracking, data mining, and browser hijacking files that these companies surreptitiously plant on a person's computer extract personal information for advertising purposes, often without the user's knowledge or consent, and they have become a growing concern to companies, individual consumers, and the government. Most importantly, as frustration and fear of spyware grow and cause more people to turn away from the Internet, e-commerce is threatened. How did we get to this point, and what are the chances of successful regulation?
Limiting Computer Crime Losses With Cyberinsurance
June 29, 2004
Estimates of the amount of damage to U.S. businesses caused by computer crime vary greatly, but there is no doubt that corporate America's increased reliance on information technology has led in recent years to a dramatic increase in such losses. <br>A 2003 study by the Computer Security Institute and the FBI found that 90% of respondents had suffered breaches of their computer system within the past year. Reports of specific instances of computer crime also suggest that the risk of damage to computer systems is real and growing.<br>Despite these real and substantial risks, many companies are not doing enough to protect themselves.
Net News
June 29, 2004
Cases and news of interest in the Internet industry. This month: House Committee Passes SPY ACT, Judge Blocks Utah Spyware Law, the RIAA Is At It Again, and more!

MOST POPULAR STORIES

  • Role and Responsibilities of Practice Group Leaders
    Ideally, the objective of defining the role and responsibilities of Practice Group Leaders should be to establish just enough structure and accountability within their respective practice group to maximize the economic potential of the firm, while institutionalizing the principles of leadership and teamwork.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›