Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,843 results for "Internet Law & Strategy"...

<b><i>Marketing Tech:</i></b> The Best Ways to Use Technology to Supplement, Rather Than Replace, Your Networking
November 02, 2015
Technology can sometimes get in the way. While our digital tools have changed our lives, making us more efficient, responsive, and productive, it can confuse our sensibilities.
Dispositive Questions Every Law Firm Should Ask of the Cloud
November 02, 2015
Cloud service providers (CSPs) offer myriad choices to law firms of all sizes who, in return, have become one of the fastest adopters of hosted cloud infrastructure worldwide. Nonetheless, asking the right questions is essential to learning cloud limitations, similarities, differentiators, caveats and benefits. From niche providers to the top five, not everything is as it seems when it comes to what is offered, how it's offered, and the up-front and hidden costs of each.
Second Circuit 'Affirms Fair Use
November 02, 2015
On Oct. 16, in <i>Authors Guild v. Google,</i> the Second Circuit affirmed a U.S. District judge's holding that Google's mass digitization of more than 20 million books from major university libraries in order to enable users of the Google Books website constitutes fair use.
Safe Harbor European Court Data Protection Ruling
November 02, 2015
On Oct. 6, the 'European Court of Justice gave a very important judgment about EU data protection law, where it ruled that the EU Safe Harbor regime is invalid, and National EU Member State data protection regulators have the power to investigate complaints about the adequacy of the level of protection of data transfers to the U.S. All U.S. business transferring personal data from the EU need to take note of this judgment.
Safe Harbor for Service Providers under the Anticybersquatting Act
November 02, 2015
GoDaddy.com has been the prevailing defendant in two major lawsuits under the Anticybersquatting Consumer Protection Act (ACPA). In both cases, plaintiffs sought to hold a defendant liable for contributory or secondary infringement rather than "direct" cybersquatting under the ACPA. The principal reason for plaintiffs' lack of success lies in a fundamental misunderstanding of the ACPA.
Eye on <i>Lenz</i> In Light of NFL Takedown Notices
November 02, 2015
In October, after receiving takedown requests from the National Football League and two college athletic conferences citing the Digital Millennium Copyright Act (DMCA), Twitter suspended two sports news feeds that feature short clips of football highlights.
Protecting Your Company's Data from Security Breaches
November 02, 2015
This article explores some steps counsel can take to protect their organizations from a data breach, and how counsel can proactively help to mitigate any adverse impact in the unfortunate event a data breach occurs.
The Art of Cyberwarfare
November 02, 2015
Cybersecurity is at a crossroads. No longer resigned to the confines of server rooms overseen by information technology, decisions regarding the protection of data have been forced into the boardroom by events that include breaches at main street businesses and revelations of clandestine government hacking activities.
Data Sharing In the Cloud
November 02, 2015
Storing and sharing data "in the cloud" has become, in many instances, a business necessity. The practical and economic advantages of cloud computing are clear ' it eliminates the need to send client data via traditional, costly methods, and is significantly less expensive than building and maintaining the same data storage capacity in-house.
How to Fix Reputational Harm
November 02, 2015
The speed with which negative Internet postings spread can cause immediate reputational harm. To remedy this harm, the nature and extent of the damage must be quantified, which is no easy task. However, new digital tools can now be used to assess and quantify damage caused by these kinds of negative Internet postings.

MOST POPULAR STORIES

  • Yachts, Jets, Horses & Hooch: Specialized Commercial Leasing Models
    Defining commercial real estate asset class is essentially a property explaining how it identifies — not necessarily what its original intention was or what others think it ought to be. This article discusses, from a general issue-spot and contextual analysis perspective, how lawyers ought to think about specialized leasing formats and the regulatory backdrops that may inform what the documentation needs to contain for compliance purposes.
    Read More ›
  • Identifying Your Practice's Differentiator
    How to Convey Your Merits In a Way That Earns Trust, Clients and Distinctions Just as no two individuals have the exact same face, no two lawyers practice in their respective fields or serve clients in the exact same way. Think of this as a "Unique Value Proposition." Internal consideration about what you uniquely bring to your clients, colleagues, firm and industry can provide untold benefits for your law practice.
    Read More ›
  • Risks and Ad Fraud Protection In Digital Advertising
    The ever-evolving digital marketing landscape, coupled with the industry-wide adoption of programmatic advertising, poses a significant threat to the effectiveness and integrity of digital advertising campaigns. This article explores various risks to digital advertising from pixel stuffing and ad stacking to domain spoofing and bots. It will also explore what should be done to ensure ad fraud protection and improve effectiveness.
    Read More ›