Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,878 results for "Internet Law & Strategy"...

Keeping Up With Keeping Up
September 01, 2005
Compliance -- dotting all the i's and crossing all the t's in a regulated business -- has always been difficult. The slightest error can lead to fines, a business shutdown or even jail time for executives.
Solo Aims To Blog His Way To New Clients
September 01, 2005
The small town of Storrs, CT, may soon become the center of the law-blog universe. Andrew W. Ewalt, a solo practicing in the shadows of the University of Connecticut, is a guinea pig for the wildly growing technology, which to date has largely been passed over by the legal profession as a marketing tool.
Mastering And Managing Documents
September 01, 2005
The attorney's own realm is no different from any other revenue-generating quarter -- e-commerce or good old-fashioned bricks and cement -- in one truism of the Technology Age: Document management is the most daunting challenge for today's law office. Regardless of the size of the law firm, mountains of file folders and forests of paper are piling up daily in every law office as quickly, and as momentously, as in the offices of their clients. Traditionally, the answer to this challenge has been to hire more clerical staff, more paralegals, and more attorneys and then to scramble to assess and assign outsourcing contracts to help erode some of the paper mountains popping up all around the legal-office landscape.
Keeping Tabs On Internet Identity
September 01, 2005
No technology issue concerns -- or should concern -- individuals, e-commerce and government regulators more than Internet identity theft. The statistics are staggering. In the last year, LexisNexis reported that unauthorized people apparently took personal information on more than 30,000 Americans from its database -- by stealing logins and passwords of legitimate customers. Another data broker, ChoicePoint Inc., reported a possible theft of similar data from as many as 145,000 people through individuals claiming to have legitimate and legal use for the data they purchased from ChoicePoint. But those numbers look small (except, of course, to the affected individuals) when compared with the identity-theft problem acknowledged by Bank of America -- involving about 1.2 million federal employees.
Can You Keep A Secret?
September 01, 2005
When a number of blogs posted secret details and drawings of Apple Computer's new music technology -- code-named Asteroid -- Apple's lawyers did what lawyers do: They sued the Web sites to find out the posters' identities and sources.
Filtering Through Regulatory Compliance
September 01, 2005
The advantages of doing business in a digital economy -- paperless transactions, instant communication, effortless administration and reaching out across borders to far-away locations to collaborate with partners in a virtual community -- are precisely the risks of doing business in a digital economy.
Subpoena For e-Mail
September 01, 2005
Every time someone hits the "send" button, evidence is created -- and electronic evidence is something with which e-commerce ventures, by their very e-nature, must be concerned. They must also come up with elements in their business-process plans to deal with compliance or other legal matters arising from e-mail.
Compensation Contradictions
August 31, 2005
The mandatory retirement and similar policies that firms have wielded to effect such transitions are now under threat. The U.S. Equal Employment Opportunity Commission presented a clear legal challenge earlier this year when it sued Sidley Austin Brown & Wood, alleging age discrimination in the firm's dismissal and demotion of older partners. But an even greater challenge to firm retirement policies may be posed by the growing number of older partners who feel they have remained highly productive and insist on holding onto privileged positions, either by negotiating special arrangements or by decamping to other firms.
Second Circuit Finds No Trademark Infringement in Targeted Internet Advertising Case
August 31, 2005
On June 27, 2005, the Second Circuit overturned a lower court's determination that an Internet advertising company's delivery of targeted, contextually relevant pop-up ads constituted trademark infringement. The plaintiff, 1-800 Contacts, Inc. ("1-800"), sued WhenU.com ("WhenU") for trademark infringement as well as multiple other federal copyright, state infringement, and common law claims. The Second Circuit limited its review of the case to the plaintiff's Lanham Act claim, remanding the rest of 1-800's claims back to the district court.
CoStar Reopens Settled Fixation Issue in Online Digital Environment
August 31, 2005
In a little-noticed and as yet un-cited alternative holding last year, the U.S. Court of Appeals for the Fourth Circuit undermined a previously unbroken line of cases holding that electronic copies of digital works are "fixed" within the meaning of the Copyright Act if they exist in the random access memory ("RAM") of a computer. <i>CoStar Group, Inc. v. LoopNet, Inc.</i>, 373 F.3d 544 (4th Cir. 2004).

MOST POPULAR STORIES

  • The Anti-Assignment Override Provisions
    UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Chambers & Partners: What's New After Sale
    On Nov. 10, 2023, Abry Partners, a leading North American middle market private equity firm, announced that it had acquired Chambers & Partners for $449 million from Inflexion, the UK private equity firm that purchased Chambers in 2018. What will this mean?
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›