Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,843 results for "Internet Law & Strategy"...

Using a Service Mark In Commerce
June 02, 2015
The Federal Circuit has now ruled that advertising a service that the applicant intends to provide in the future, but is not actually providing on the date of the application, is not "use in commerce." Thus, advertising submitted to the USPTO with a use-based application as a specimen of use of the mark in commerce, must relate to existing services already being provided to customers.
Navigating the Minefield of U.S. Export Control
June 02, 2015
While the export control regulatory framework can present a dizzying array of requirements for exporters, companies also risk being held responsible for the activities of others, including those abroad who trans-ship their products to destinations embargoed by the United States, or in violation of U.S. licensing or regulatory requirements.
Get a (Law) Firm Grip on Data Breaches
June 02, 2015
Law firms are as much at risk for cyber attacks as any other industry. Because of the lack of reporting requirements in the industry, it is unclear how many breaches have actually occurred. This article describes some of the reasons law firms are cyber-attack targets, steps they can take to reduce their risk, and what clients are doing to encourage law firms in those efforts.
Get a (Law) Firm Grip on Data Breaches
June 02, 2015
Law firms are as much at risk for cyber attacks as any other industry. Because of the lack of reporting requirements in the industry, it is unclear how many breaches have actually occurred. Fortunately, law firms are now recognizing the risk and beginning to take preventive action. This article describes some of the reasons law firms are cyber-attack targets, steps they can take to reduce their risk, and what clients are doing to encourage law firms in those efforts.
Cybersecurity Lawyers Getting Plenty of Company
June 02, 2015
High-profile data breaches in the past few years have been a wakeup call for corporate America ' and made cybersecurity and data privacy the next "it" practice for lawyers. There's been a gold rush to the field, practitioners say ' and the potential rewards have attracted some Johnny-come-latelies and pushed attorneys to seek out new ways of distinguishing themselves as experts.
Avoid Drowning in Data
June 02, 2015
Data is a rich source for evidence in litigation and, for many companies, a valuable asset. What is less apparent, however, is exactly how to properly manage information and its privacy and security. However, over the past several decades, best practices have been developed for establishing and managing a comprehensive privacy, data protection and information governance program. This article summarizes those learnings to suggest an approach for how to design and run a program that is right for your company.
<b><i>Online Extra:</b></i> Battle Over .SUCKS Domain Gets Testy
June 02, 2015
The registry that owns the controversial domain name ".sucks" has put the Internet Corporation for Assigned Names and Numbers (ICANN) on notice that its criticisms and actions against the company could lead to legal action.
Browse, Click, Sign, Enforce?
June 02, 2015
Signing, dating and keeping a record of a paper contract are standard practice ' but what about those that are native to websites, mobile apps and other digital platforms, and use such language as "Terms of Use," "Terms of Service," "Privacy Policies" and disclaimers? How do you track who is agreeing to what and when they agreed?
<b><i>Online Extra:</b></i> FTC Sued Over Refusal to Disclose Data Security Policies
May 28, 2015
' The Federal Trade Commission (FTC) was sued last month for refusing to turn over information about how the agency decides to bring data security cases. The Freedom of Information Act suit by Philip Reitinger, a former Department of Homeland Security official who is now president of a cybersecurity company, comes as the FTC'defends its role as data security cop'in two ongoing cases. &#133;
<b><i>Online Extra:</b></i> Data Breaches on Track to Cost Companies $2.1 Trillion
May 28, 2015
As more corporate infrastructure moves online, new research suggests the rising number and impact of data breaches will cost $2.1 trillion globally by 2019, almost four times the estimated cost of breaches in 2015.

MOST POPULAR STORIES

  • Yachts, Jets, Horses & Hooch: Specialized Commercial Leasing Models
    Defining commercial real estate asset class is essentially a property explaining how it identifies — not necessarily what its original intention was or what others think it ought to be. This article discusses, from a general issue-spot and contextual analysis perspective, how lawyers ought to think about specialized leasing formats and the regulatory backdrops that may inform what the documentation needs to contain for compliance purposes.
    Read More ›
  • Identifying Your Practice's Differentiator
    How to Convey Your Merits In a Way That Earns Trust, Clients and Distinctions Just as no two individuals have the exact same face, no two lawyers practice in their respective fields or serve clients in the exact same way. Think of this as a "Unique Value Proposition." Internal consideration about what you uniquely bring to your clients, colleagues, firm and industry can provide untold benefits for your law practice.
    Read More ›
  • Risks and Ad Fraud Protection In Digital Advertising
    The ever-evolving digital marketing landscape, coupled with the industry-wide adoption of programmatic advertising, poses a significant threat to the effectiveness and integrity of digital advertising campaigns. This article explores various risks to digital advertising from pixel stuffing and ad stacking to domain spoofing and bots. It will also explore what should be done to ensure ad fraud protection and improve effectiveness.
    Read More ›