Monitoring Employee Social Media Activity
May 02, 2015
Last year, the Pew Center released its demographic data on social media usage. The data revealed that ' regardless of age, race, sex, education or income ' nearly 75% of all adults in the United States who use the Internet use social media. The time is ripe to examine the pros, cons and pitfalls of monitoring employee social media postings from a legal perspective.
The Internet User's Duty of Care
May 02, 2015
The duty one Internet user has to another has changed, particularly with respect to cyber-security and privacy. Negligence by Internet users has enabled hackers and creators of viruses to exploit computer systems and engage in crime and unwanted computer intrusions.
Big Data Rights Protection Found in Internet Copyright Law
May 02, 2015
The Big Data-Internet connection is evidenced by the fact that the Internet is required for most Big Data transactions, including collection, storage and dissemination. Most of Big Data's content consists of uniquely Internet-related elements, namely users' transactions, meta-tag applicators and Internet content providers.
Deritivative Cyber Litigation
May 02, 2015
Potential liability for data breaches has emerged as a major concern for businesses in the past few years as massive cyber-attacks are increasing, with companies that use or store private customer data electronically or use social media as part of their marketing strategy being the prime targets.
The Changing Face of Legal Research
May 02, 2015
Executing a powerful business development plan is a challenge every attorney faces. For attorneys at small firms and with solo practices, doing it without breaking the bank is one of the biggest hurdles to a thriving practice.
How to Obtain Social Media Data for Defending Lawsuits
May 02, 2015
It is pivotal that a practitioner who wants to conduct formal discovery of social media user content understand how each site stores and communicates its data. Armed with information, the informed attorney may well reap huge rewards when engaging in digital discovery.
Avoid Drowning in Data
May 02, 2015
In the era of almost daily news accounts of data security breaches, the legal and business imperative for data and data system protection needs no explanation. What is less apparent, however, is exactly how to properly manage information and its privacy and security. This article suggests an approach for how to design and run a program that is right for your company.
NLRB Shields Online Rants
May 02, 2015
To some, a recent labor board ruling about social media marks the end of workplace civility. To others, it's a boost to protected speech.
Securing a Document Review Center: A Practical Guide
May 02, 2015
Much ink has been spilled in recent years about information security, hacker exploits and hardware and software products used to thwart hackers. Not a single day goes by without news pertaining to the discovery of vulnerabilities in the software we use and cherish, and to hacker exploits affecting the companies we use in our daily lives.