Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,886 results for "Internet Law & Strategy"...

The Human Factor In Information Security
No one can deny that cyberattacks are the new norm. Such risks will increasingly challenge our ability to operate our businesses. In the world of cybercrime, everyone — from individuals to nation-states — is a target. However, some targets are more alluring than others.
What Lawyers Can Learn from Uber, Redux
Lawyers need to know what the client wants and how to get them there before the process starts. Just like a driver who doesn't know exactly where he's taking his riders, a lawyer who isn't totally sure what a client wants — let alone how to get them there efficiently and effectively — is likely to end up with a client who is disgruntled.
Estate Planning for the Digital Afterlife
This article discusses the importance of accounting for digital assets in an estate plan, provides practical considerations for handling their disposition after death, and describes the current state of the law for the handling of digital assets after death.
<i>Online Extra</i> <br>Are Google's Confidentiality Agreements Illegal?
A current Google Inc. employee has sued the tech giant over its rules for protecting confidential information, alleging they prohibit workers from whistleblowing or even just complaining to their spouse about their boss. Employment lawyers say that if the allegations in the complaint are true — a big if, of course — Google's rules may well be overly restrictive.
The Human Factor In Information Security
No one can deny that cyberattacks are the new norm. Such risks will increasingly challenge our ability to operate our businesses. In the world of cybercrime, everyone — from individuals to nation-states — is a target. However, some targets are more alluring than others.
Cyberinsurance Considerations for Law Firms
Law firms spend a lot of time and effort to protect their clients' interests, but often overlook routine protection and security of clients' (and their own) data. While not a cure-all for data security risks, one important component to consider in putting together a comprehensive data security program is cyber insurance, as most general liability policies and professional liability policies now expressly exclude coverage for data breach claims.
Why the DMCA Needs to Be Modernized
It has been 18 years since the DMCA was signed into law. It was created to balance the security and rights of copyright holders with the growing influence of digital communications. But today it is facing serious criticism about its usefulness from every key stakeholder — creators, distributors and consumers alike.
Recent Disputes over Copyright Licenses
This article discusses disputes involving the use of copyrighted works or intellectual property underlying that work, under a license, or in one case, under an implied license. The parties thereto are not nearly as well-known, but the legal conclusions reached may have farther reaching implications.
Estate Planning for the Digital Afterlife
As more Americans establish personal email accounts, social media accounts, and other electronic accounts, these “digital assets” are becoming an increasingly vital estate-planning consideration. The failure to consider how to dispose of digital assets in an individual's estate plan could result in later complexities following the individual's death.
China Passes Controversial Internet Security Law
The Standing Committee of the National People's Congress, China's top legislature approved the new Cybersecurity Law on November 7, which was created for reasons of national security and to curb internet fraud. It will take effect in June 2017.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • A 'Cloud Security Doctrine' for Law Firms
    Cloud computing may be here to stay, but is it truly safer than the solutions that it's outmoding? The Legal Cloud Computing Association (LCCA) thinks there's a path to greater security, publishing for law firms its first "Cloud Security Doctrine."
    Read More ›
  • Artist Challenges Copyright Office Refusal to Register Award-Winning AI-Assisted Work
    Copyright law has long struggled to keep pace with advances in technology, and the debate around the copyrightability of AI-assisted works is no exception. At issue is the human authorship requirement: the principle that a work must have a human author to be eligible for copyright protection. While the Copyright Office has previously cited this "bedrock requirement of copyright" to reject registrations, recent decisions have focused on the role of human authorship in the context of AI.
    Read More ›
  • IP News
    Federal Circuit: PTAB Did Not Err In Finding That It Retained Authority to Issue Final Written Decision After Deadline Passed Federal Circuit: District Court Did Not Err In Finding That an Abbreviated New Drug Application Is Limited to the Uses Described Therein
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›