Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,843 results for "Internet Law & Strategy"...

Monitoring Employee Social Media Activity
May 02, 2015
Last year, the Pew Center released its demographic data on social media usage. The data revealed that ' regardless of age, race, sex, education or income ' nearly 75% of all adults in the United States who use the Internet use social media. The time is ripe to examine the pros, cons and pitfalls of monitoring employee social media postings from a legal perspective.
The Internet User's Duty of Care
May 02, 2015
The duty one Internet user has to another has changed, particularly with respect to cyber-security and privacy. Negligence by Internet users has enabled hackers and creators of viruses to exploit computer systems and engage in crime and unwanted computer intrusions.
Big Data Rights Protection Found in Internet Copyright Law
May 02, 2015
The Big Data-Internet connection is evidenced by the fact that the Internet is required for most Big Data transactions, including collection, storage and dissemination. Most of Big Data's content consists of uniquely Internet-related elements, namely users' transactions, meta-tag applicators and Internet content providers.
Deritivative Cyber Litigation
May 02, 2015
Potential liability for data breaches has emerged as a major concern for businesses in the past few years as massive cyber-attacks are increasing, with companies that use or store private customer data electronically or use social media as part of their marketing strategy being the prime targets.
The Changing Face of Legal Research
May 02, 2015
Executing a powerful business development plan is a challenge every attorney faces. For attorneys at small firms and with solo practices, doing it without breaking the bank is one of the biggest hurdles to a thriving practice.
How to Obtain Social Media Data for Defending Lawsuits
May 02, 2015
It is pivotal that a practitioner who wants to conduct formal discovery of social media user content understand how each site stores and communicates its data. Armed with information, the informed attorney may well reap huge rewards when engaging in digital discovery.
SEC's Final Regulations for Implementing JOBS Act Crowd-Funding Capital Raising
May 02, 2015
The SEC issued draft regulations for implementing Title IV of the JOBS Act on March 25, 2015. The new regulations offer a way for an issuer to run an Internet-based, crowd-funding securities offering to both accredited and non-accredited investors.
Avoid Drowning in Data
May 02, 2015
In the era of almost daily news accounts of data security breaches, the legal and business imperative for data and data system protection needs no explanation. What is less apparent, however, is exactly how to properly manage information and its privacy and security. This article suggests an approach for how to design and run a program that is right for your company.
NLRB Shields Online Rants
May 02, 2015
To some, a recent labor board ruling about social media marks the end of workplace civility. To others, it's a boost to protected speech.
Securing a Document Review Center: A Practical Guide
May 02, 2015
Much ink has been spilled in recent years about information security, hacker exploits and hardware and software products used to thwart hackers. Not a single day goes by without news pertaining to the discovery of vulnerabilities in the software we use and cherish, and to hacker exploits affecting the companies we use in our daily lives.

MOST POPULAR STORIES

  • Yachts, Jets, Horses & Hooch: Specialized Commercial Leasing Models
    Defining commercial real estate asset class is essentially a property explaining how it identifies — not necessarily what its original intention was or what others think it ought to be. This article discusses, from a general issue-spot and contextual analysis perspective, how lawyers ought to think about specialized leasing formats and the regulatory backdrops that may inform what the documentation needs to contain for compliance purposes.
    Read More ›
  • Identifying Your Practice's Differentiator
    How to Convey Your Merits In a Way That Earns Trust, Clients and Distinctions Just as no two individuals have the exact same face, no two lawyers practice in their respective fields or serve clients in the exact same way. Think of this as a "Unique Value Proposition." Internal consideration about what you uniquely bring to your clients, colleagues, firm and industry can provide untold benefits for your law practice.
    Read More ›
  • Risks and Ad Fraud Protection In Digital Advertising
    The ever-evolving digital marketing landscape, coupled with the industry-wide adoption of programmatic advertising, poses a significant threat to the effectiveness and integrity of digital advertising campaigns. This article explores various risks to digital advertising from pixel stuffing and ad stacking to domain spoofing and bots. It will also explore what should be done to ensure ad fraud protection and improve effectiveness.
    Read More ›