Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,843 results for "Internet Law & Strategy"...

Using Unlicensed Photos On Websites
August 02, 2015
For a long time, people have generally felt it appropriate to go onto various image search engines, find a photo and then cut and paste it into their publication or website. One of the reasons this was so easy to get away with was that there was no effective way for photographers to find unlicensed uses of their work. Of late, however, photographers either have acquired new technology or have engaged search companies that have image-searching technology.
Broadening the Scope of Privacy Under the Video Protection Statute
August 02, 2015
A recent case from the District of Massachusetts, <i>Yershov v. Gannett Satellite Information Network,</i> suggests a broadening of the view of subscriber privacy in the context of the delivery of video content over online platforms.
Data Sharing in the Cloud
August 02, 2015
Storing and sharing data "in the cloud" has become, in many instances, a business necessity. The practical and economic advantages of cloud computing are clear ' it eliminates the need to send client data via traditional, costly methods, and is significantly less expensive than building and maintaining the same data storage capacity in-house.
<b><i>Media & Communications:</i></b> Five PR Obstacles
August 02, 2015
Whether you are an in-house communications manager or a PR consultant, every day presents new challenges. With experience, how you respond may become automatic, while others require more in-depth thinking for solutions.
The Art of Cyberwarfare
August 02, 2015
Cybersecurity is at a crossroads. No longer resigned to the confines of server rooms overseen by information technology, decisions regarding the protection of data have been forced into the boardroom by events that include breaches at main street businesses and revelations of clandestine government hacking activities.
A Six-Step Data Privacy Program Health Check
August 02, 2015
Data protection is the responsibility of every individual in the company, and the legal and IT departments should only be drafting contractual languages, policies, and guidelines while working in tandem with each other.
Three Lessons for a Proactive Approach To Cybersecurity
August 02, 2015
Do you know where your client's or organization's data is? It's not a rhetorical question ' it's a serious issue that should be at the core of any cybersecurity assessment.
IP News
August 02, 2015
Federal Circuit Affirms '101 Subject Matter Invalidity of Internet-Related Software Patents Under <i>Alice</i><br>Patent Term Adjustments Do Not Apply To Continuing Applications Based On Delays In Application Prosecution<br>Federal Circuit Clarifies Standard of Review and Affirms Denial of Award for '285 Exceptional Case Attorney's Fees
Wave of Privacy Suits Peters Out
July 02, 2015
Michael Rhodes, the charismatic chair of Cooley's privacy and data protection practice, took the stage at an awards dinner in late April with an extra bounce in his step ' and a blunt prediction for his colleagues in the plaintiffs privacy bar.
Sensitive Data Loss is Not Inevitable
July 02, 2015
Global banking institutions are increasingly pressing outside law firms to demonstrate they are employing top-tier technologies to defend against cyber hackers. In some cases, firms are being asked to fill out 60-page questionnaires detailing their cybersecurity measures in minute detail, while others must consent to on-site inspections.

MOST POPULAR STORIES

  • Yachts, Jets, Horses & Hooch: Specialized Commercial Leasing Models
    Defining commercial real estate asset class is essentially a property explaining how it identifies — not necessarily what its original intention was or what others think it ought to be. This article discusses, from a general issue-spot and contextual analysis perspective, how lawyers ought to think about specialized leasing formats and the regulatory backdrops that may inform what the documentation needs to contain for compliance purposes.
    Read More ›
  • Identifying Your Practice's Differentiator
    How to Convey Your Merits In a Way That Earns Trust, Clients and Distinctions Just as no two individuals have the exact same face, no two lawyers practice in their respective fields or serve clients in the exact same way. Think of this as a "Unique Value Proposition." Internal consideration about what you uniquely bring to your clients, colleagues, firm and industry can provide untold benefits for your law practice.
    Read More ›
  • Risks and Ad Fraud Protection In Digital Advertising
    The ever-evolving digital marketing landscape, coupled with the industry-wide adoption of programmatic advertising, poses a significant threat to the effectiveness and integrity of digital advertising campaigns. This article explores various risks to digital advertising from pixel stuffing and ad stacking to domain spoofing and bots. It will also explore what should be done to ensure ad fraud protection and improve effectiveness.
    Read More ›