Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,901 results for "Internet Law & Strategy"...

eSports Raise Labor Law Issues for Teams and Players
January 01, 2018
The preference of the parties involved, even if reduced to writing, is rarely determinative of employment status. Instead, the specifics of the relationship will govern.
Internet Goods and Product Liability
January 01, 2018
The Internet's value arises in part from its ability to provide images, data and content quickly and at little cost. This ability results from the fact that Internet products — whether they be images, data or content — are each reduced to a digital format. Sharing products that have been so reduced may result in product liability.
IP News
January 01, 2018
Federal Circuit Affirms Finding That Rembrandt's Patent Is Not Infringed by Apple's Accused Products<br>District Court Transfers Case after Federal Circuit Ordered It to Reconsider Party's Venue Objections In Light of <i>TC Heartland</i><brPTAB Decision Invalidating AIP Internet Network Patent Affirmed on Appeal
<i>Online Extra:</i><br>Social Media: Questions of Admissibility And Ethics
January 01, 2018
Social media evidence can be acquired both informally — through an attorney's own investigation or from the client — or more formally through the use of discovery and the rules of discovery. While each gives rise to practical and ethical issues, this section will focus on informal methods of acquisition.
Marketing Tech: How to Attract New Business
January 01, 2018
Are your lawyers marketing more and receiving less in return? The solution is two-fold: they need to improve their in-person and online marketing.
In an Era of Crises and Controversies, How Ready Is Your Law Firm?
January 01, 2018
Although the current news cycle is a barrage of negative situations, the silver lining is that they offer law firms a wealth of teachable moments about the importance of preparing for and responding to a crisis situation.
The Cyber Shot Across the Bow: Data Manipulation and GPS Spoofing
December 01, 2017
In September 2015, then-Director of National Intelligence James Clapper warned that the next "push of the envelope" in cybersecurity might be attacks that change or manipulate electronic information in order to compromise its accuracy or reliability. Two years later, we may now be seeing the beginning of such insidious attacks, in the context of GPS spoofing — a technique that sends false signals to systems that use GPS signals for navigation.
Regulators Are Catching Up to Cryptocurrency and Blockchain Technology within the Financial Services Industry
December 01, 2017
<b><i>Part One of a Two-Part Article</b></i><p>As we head into 2018, cryptocurrency and blockchain will continue to be a top initiative for pioneers in the financial services industry. As with any innovation within the financial services industry, the regulators are never far behind and are doing their best to keep up. Those that enter this space will find that they also have to pioneer the controls to manage the regulatory risks this technology presents.
Five Smart Steps to Prepare for GDPR Data Subject Rights
December 01, 2017
Many corporations around the globe are preparing for May 2018, when Europe's General Data Protection Regulation (GDPR) enforcement kicks in. The regulation encompasses a wide range of nuanced privacy requirements that can be challenging to operationalize. In particular, requirements around the rights of European data subjects — which include the right to be forgotten and rights to access, rectification and objection to processing — will be some of the most difficult to address.
Data Integrity and Incident Response
December 01, 2017
The skill required to successfully exfiltrate 143 million records is certainly sufficient to successfully attack the integrity of that very same data. It is generally accepted that cyber criminals have not performed integrity attacks because there is a minimal profit motive: Records have a black-market value; in integrity attacks, there is no deliverable that can be sold. This paradigm may be shifting.

MOST POPULAR STORIES