Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,892 results for "Internet Law & Strategy"...

Fighting Biometric Fraud on the Blockchain
January 01, 2019
The use of SMS verification codes as a security measure has recently been exposed as a mere stop-gap solution because of the ability of hackers to fraudulently take over phone numbers. Biometrics meanwhile is proving to be one of the best new technologies to combat fraud and identity theft.
Federal Data Privacy Legislation Is Likely Next Year, Tech Lawyers Say
January 01, 2019
For Years, Federal Legislators Have Attempted to Pass Comprehensive Cybersecurity and Data Privacy Legislation. With More Support Than Ever from the Public, Industry and Both Sides of the Political Spectrum, 2019 May Be the Year When Such Legislation Is Enacted.
Patent Eligibility Remains Uncertain — Especially for the Life Sciences — Even After Recent Federal Circuit Decisions and Efforts By the USPTO to Bring Clarity
January 01, 2019
Part One of a Two-Part Article Congress is empowered to create a patent system to promote the useful arts, and it has enacted laws to create a patent system that encourages innovation. Balancing that power, however, the courts in recent years have tried to rein in the scope of the patent right by limiting the scope of patent-eligible subject matter.
Making Sense of YouTube's Monetization Policies
January 01, 2019
This article delves into YouTube's policies for channel monetization, explores the different streams of revenue an artist or creator may be entitled to receive for their works, and offer suggestions to indie creators and more established creators, so they can meet these new thresholds.
Legal Tech: Moving to the Cloud for Business Continuity Planning
January 01, 2019
In the past year, the devastation caused by natural disasters has been immense. Law firms, like every other business, are left to deal with the aftermath of these catastrophic events. Firms that have established business continuity plans to put into effect when these instances occur will find themselves a step ahead in the disaster recovery process. And the ones leveraging cloud technology are at an even greater advantage.
Risks in Online Collection of Children's Data
January 01, 2019
As convenient, useful and cool mobile technology and interconnected devices are, they come with risks that remain largely unseen or, worse, ignored. Some pose security risks and privacy risk, like those present in voice-activated devices — especially for children. For manufacturers, they also pose regulatory litigation and insurance risks, especially when children end up using their “smart” products.
Bit Parts
January 01, 2019
Complaints to Amazon by TV Show Host and His Attorney Didn't Constitute DMCA Notices<br>No Actual Malice by Defendants in Libel Suit over Composite Character in Film
Sticking a Hand in the Internet Cookie Jar
December 01, 2018
Why Collecting Children's Online Data is a Risk As convenient, useful and cool mobile technology and interconnected devices are, they come with risks that remain largely unseen or, worse, ignored. For manufacturers, they also pose regulatory litigation, and insurance risks, especially when children end up using their "smart" products.
Right Out of the Box: California Enacts First-of-its-Kind Statute Regulating Internet-of-Things
December 01, 2018
<b><i>Companies Impacted By California's SB-327 — Especially Manufacturers and Distributors of IoT Devices — Should Work to Ensure Compliance With the Act As Soon As Possible If Regulatory Fallout Is to Be Avoided Come January 2020</b></i><p>While a great deal of attention has focused on the California Consumer Privacy Act, California also passed a less-publicized, but highly critical, statute that will regulate certain aspects of Internet of Things device security.
The Blockchain Can Finally Secure Supply Chains Against Cyberattacks
December 01, 2018
Cyber criminals looking for new ways to exploit company networks are turning their focus to the privileged network access given to the many players involved in supply chains. As supply ecosystems grow, and points of vulnerability proliferate, businesses will have to turn to distributed ledger technology.

MOST POPULAR STORIES

  • Meet the Lawyer Working on Inclusion Rider Language
    At the Oscars in March, Best Actress winner Frances McDormand made “inclusion rider” go viral. But Kalpana Kotagal, a partner at Cohen Milstein Sellers &amp; Toll had already worked for months to write the language for such provisions. Kotagal was developing legal language for contract provisions that Hollywood's elite could use to require studios and other partners to employ diverse workers on set.
    Read More ›
  • Disconnect Between In-House and Outside Counsel
    'Disconnect Between In-House and Outside Counsel is a continuation of the discussion of client expectations and the disconnect that often occurs. And although the outside attorneys should be pursuing how inside-counsel actually think, inside counsel should make an effort to impart this information without waiting to be asked.
    Read More ›