Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,878 results for "Internet Law & Strategy"...

Spitzer Files Spyware Suit
May 25, 2005
New York Attorney General Eliot Spitzer sued a major Internet marketer last month, blaming it for secretly installing software that delivers nuisance pop-up advertisements and can slow and crash personal computers.
Supreme Court Ruling Gives Winemakers a Reason to Raise Glasses
May 25, 2005
The U.S. Supreme Court gave a cork-popping victory to the wine industry last month, striking down state laws that barred consumers from receiving direct shipment of wines from out-of-state wineries.
'Information Security 101'
May 25, 2005
Recent headlines have reported a startling number of security breaches and information thefts. A major university notified 120,000 of its alumni after a computer containing fundraising information including addresses and Social Security numbers was hacked by an unknown intruder; a subsidiary of the Lexis Nexis group announced that the records of 32,000 individuals may have fallen into the hands of thieves using the passwords of legitimate subscribers; Bank of America reported the loss of backup tapes containing the financial records of up to 1.2 million federal employees; payroll outsourcer PayMaxx faced allegations that it had exposed 25,000 customer records, including W-2 information, online; and cell phone provider T-Mobile released information about a hacker who was able to exploit a security weakness in a commercial software package to access customer records, sensitive government documents, private e-mail and candid celebrity photos.
A Primer on Custody Issues in Pennsylvania and Beyond
May 03, 2005
Custody matters are addressed to the court, either as an initial Petition regarding custody, or as a Petition to Modify an existing custody order. Custody petitions may be brought by a parent, and under certain circumstances by a grandparent or by a third party. "It is axiomatic that in custody disputes, 'the fundamental issue is the best interest of the child.'" Charles v. Stehlik, 560 Pa. 334, 339, 744 A.2d 1255, 1258 (2000), quoting <i>Ellerbe v. Hooks</i>, 490 Pa. 363, 416 A.2d 512, 513 (1980). "Custody cases are unique in that they involve disputes between two people (generally parents) regarding the upbringing of their children. There is little applicability of substantive law from other fields into custody cases. Custody law and analysis will not be applied in situations other than those regarding children." <i>DeSanctis v. Pritchard</i>, 803 A.2d 230, (Pa. Super. 2002) (custody of a dog).
Electronic Waste Recycling Laws Challenge the Leasing Industry
May 02, 2005
An increasing number of state legislatures are deciding that there is a need to recycle computer components and other electronic waste, also known as "e-waste," and thus are proposing diverse laws intended to encourage or require such recycling. Equally diverse, to the point of creating conflicts and confusion, are the ways in which the various state legislatures propose to raise the funds to pay for such programs. Two states, California and Maine, have enacted such legislation and, at press time, 14 states have proposed such legislation. On Jan. 1, 2005, California's law was the first to go into effect. This article describes the Equipment Leasing Association's policy on legislation requiring advanced recycling fees. The article reviews California's new e-waste law and highlights some of the concerns to the leasing industry with regard to California's law.
Business Crimes Hotline
May 02, 2005
Recent rulings you need to know.
Internet Usage Threatens Existence of Concurrent Use Registrations
May 02, 2005
In a rare concurrent use decision, <i>Hubcap Heaven, LLC v. Hubcap Heaven, Inc.</i>, Concurrent Use No. 94001147 (Jan. 25, 2005) [not citable], the Trademark Trial and Appeal Board ("TTAB") questioned the continued viability of concurrent use registrations in the face of the Internet's global reach. Concurrent usage is based on the premise that two owners of the same trademark for competing goods and services can coexist by carving out strict geographic territories for each user. The Internet, however, has no geographic boundaries.
IP News
May 02, 2005
Highlights of the latest intellectual property news and cases from around the country.
Time to Replace Your Accounting Software?
April 29, 2005
Changes in business strategies, rising client demands, and technology advances all have made a law firm's choice of accounting software an ever more important management decision. Five years ago the Y2K scare led many firms to upgrade or replace their accounting systems out of perceived tactical necessity. Now, however, an assessment of your accounting software should be strategic: how well does it support your overall business objectives?
<b>Meyerowitz on Marketing</b>The Law Library Meets Marketing and Technology Head On
April 29, 2005
Librarians who have begun to work relatively recently in law firms probably never have participated in a "shifting party" or in any similar event. That's because the nature of the law firm library ' and thus the librarian's role ' has undergone revolutionary change over the years. There still are books, at least some books, in today's law firm libraries, but Internet connections and CD-ROMs often seem to be just as prevalent and, perhaps, are actually even more important.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›