Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,843 results for "Internet Law & Strategy"...

Vendor Limitations of Liability for Security Breaches
August 02, 2015
Counsel advising companies on vendor contracts are in a tough spot. Cybersecurity risks presented by data outsourcing demand increasing attention and resources. At the same time, outsourcing of data to third-party vendors has become, in many instances, a business necessity.
Browse, Click, Sign, Enforce?
August 02, 2015
Signing, dating and keeping a record of a paper contract are standard practice. However, that standard practice does not easily translate to online legal agreements ' the agreements that are native to websites, mobile apps and other digital platforms such as "Terms of Use," "Terms of Service," "Privacy Policies" and disclaimers.
<i>En Banc</i> Ninth Circuit Overturns Injunction In Anti-Islamic Video Case
August 02, 2015
More than a year after a divided panel of the Ninth Circuit issued a controversial and roundly criticized decision in <i>Garcia v. Google</i> that an actress appearing in a five-second segment of a film could use copyright law to force YouTube to remove the film from its website, the Ninth Circuit sitting <i>en banc</i> has rejected the panel's decision.
Imposing Liability Under DMCA Counter-Notification Provision
August 02, 2015
Although seemingly dry, the few cases heretofore that have confronted questions surrounding misrepresenting takedown notices have contained facts that are arguably ripped from the tabloids, including a bitter dispute between bloggers over the proper method of childbirth, and a kerfuffle arising from the wider publication of the views of a pro-straight pride organization in the U.K.
Data Sharing in the Cloud
August 02, 2015
Storing and sharing data "in the cloud" has become, in many instances, a business necessity. The practical and economic advantages of cloud computing are clear ' it eliminates the need to send client data via traditional, costly methods, and is significantly less expensive than building and maintaining the same data storage capacity in-house.
Easy-to-Use Collection Technology Leads to Lower e-Discovery Costs
August 02, 2015
Corporate legal departments are all about cost control and efficient processes, yet when hit with a new investigation or lawsuit, legal teams often reflexively fall back on the "collect everything" mentality. The emergence of targeted and remote collection technologies now makes it possible for corporations to collect in a legally defensible way that reduces cost and minimizes business disruption.
Issues in Using Unlicensed Photos On Websites
August 02, 2015
For a long time, people have generally felt it appropriate to go onto various image search engines, find a photo and then cut and paste it into their publication or website. One of the reasons this was so easy to get away with was that there was no effective way for photographers to find unlicensed uses of their work. Of late, however, photographers either have acquired new technology or have engaged search companies that have image-searching technology.
How to Determine a Diligent Job Search
August 02, 2015
If a plaintiff in a discrimination case or a recipient spouse in a divorce action is unemployed or under-employed and seeking compensation or maintenance, that party's employability must be ascertained in order to determine a fair and just award. Frequently, this requires consultation with, or testimony by, a vocational or employability expert.
'Customary Operations' or A Vacant Building?
August 02, 2015
Many times, courts are faced with the question of whether a loss location is 'vacant' under a commercial property policy when trying to determine if the building owner or lessee is conducting customary operations. This article explores various decisions across the United States as to what is considered 'customary operations,' thereby rendering the property 'vacant.'
Using Unlicensed Photos on Websites
August 02, 2015
For a long time, people have generally felt it appropriate to go onto various image search engines, find a photo and then cut and paste it into their publication or website. One of the reasons this was so easy to get away with was that there was no effective way for photographers to find unlicensed uses of their work. Of late, however, photographers either have acquired new technology or have engaged search companies that have image-searching technology.

MOST POPULAR STORIES

  • Yachts, Jets, Horses & Hooch: Specialized Commercial Leasing Models
    Defining commercial real estate asset class is essentially a property explaining how it identifies — not necessarily what its original intention was or what others think it ought to be. This article discusses, from a general issue-spot and contextual analysis perspective, how lawyers ought to think about specialized leasing formats and the regulatory backdrops that may inform what the documentation needs to contain for compliance purposes.
    Read More ›
  • Identifying Your Practice's Differentiator
    How to Convey Your Merits In a Way That Earns Trust, Clients and Distinctions Just as no two individuals have the exact same face, no two lawyers practice in their respective fields or serve clients in the exact same way. Think of this as a "Unique Value Proposition." Internal consideration about what you uniquely bring to your clients, colleagues, firm and industry can provide untold benefits for your law practice.
    Read More ›
  • Risks and Ad Fraud Protection In Digital Advertising
    The ever-evolving digital marketing landscape, coupled with the industry-wide adoption of programmatic advertising, poses a significant threat to the effectiveness and integrity of digital advertising campaigns. This article explores various risks to digital advertising from pixel stuffing and ad stacking to domain spoofing and bots. It will also explore what should be done to ensure ad fraud protection and improve effectiveness.
    Read More ›