Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Safe Harbor for Service Providers under the Anticybersquatting Act Image

Safe Harbor for Service Providers under the Anticybersquatting Act

Gerald M. Levine

GoDaddy.com has been the prevailing defendant in two major lawsuits under the Anticybersquatting Consumer Protection Act (ACPA). In both cases, plaintiffs sought to hold a defendant liable for contributory or secondary infringement rather than "direct" cybersquatting under the ACPA. The principal reason for plaintiffs' lack of success lies in a fundamental misunderstanding of the ACPA.

Features

<b><i>Online Extra:</b></i> NJ Legislature Moves on Cybersecurity Bill Image

<b><i>Online Extra:</b></i> NJ Legislature Moves on Cybersecurity Bill

Michael Booth

The New Jersey Legislature on Oct. 5 began taking steps toward increasing its ability to combat cybercrime.

Features

Overcoming Challenges In Transferring Technology In Academia and Beyond Image

Overcoming Challenges In Transferring Technology In Academia and Beyond

Randi Isaacs, Stacy Fredrich & Alyssa Walker

University technology transfer offices (TTOs) bridge the gap between innovation and commercialization by identifying ways to protect university-generated innovations from unauthorized exploitation, by obtaining the appropriate protection for such innovations, and by facilitating commercialization of these innovations. For-profit companies worldwide engage in a similar process; however, universities face unique challenges in these efforts.

Features

Reviewing the CFAA Image

Reviewing the CFAA

Stephen M. Kramarsky

Locks, the saying goes, keep honest people honest. But no lock is perfect and the determined thief will always find a way in. In recent years, it has become obvious that the same is true of the Internet.

Features

The Key to ELM Success Is Creating A Great User Experience Image

The Key to ELM Success Is Creating A Great User Experience

Linda Hovanec

The tasks involved in managing legal, risk and compliance functions aren't simple. But when they take place with the support of a comprehensive Enterprise Legal Management (ELM) solution with a well-designed and holistic user experience, it can all be executed with confidence and efficiency.

Features

Twitter Faces Privacy Suit over Direct Messages Image

Twitter Faces Privacy Suit over Direct Messages

David Ruiz

Twitter Inc. has been hit with a proposed class action alleging that the company's handling of direct messages between users violates the Electronic Communications Privacy Act (ECPA).

Features

2015 Trends: Balancing Judicial vs. Corporate e-Discovery Practices Image

2015 Trends: Balancing Judicial vs. Corporate e-Discovery Practices

Bill Piwonka

The changing data landscape and prevalence of new data sources continues to impact how e-discovery is addressed. I had the opportunity to discuss these impacts with Andrea D'Ambra, senior counsel for Norton Rose Fulbright, as part of a recent webcast. We compared and contrasted findings from Norton Rose Fulbright's Litigation Trends Annual Survey of in-house counsel and Exterro's 2015 Federal Judges' Survey. Following are the takeaways we discussed.

Features

<i>Ariosa Diagnostics v. Sequenom </i> Image

<i>Ariosa Diagnostics v. Sequenom </i>

David L. Walker & Angela L. Morrison

On June 12, 2015, the U.S. Court of Appeals for the Federal Circuit, in <i>Ariosa Diagnostics,</i> affirmed a grant of summary judgment of invalidity of another patent in the biotech space. The decision adds to a long and growing list of patents that have fallen in the wake of the Supreme Court's recent 35 U.S.C. '101 jurisprudence.

Features

Using Digital Tools To Assess and Remedy Online Reputational Damage Image

Using Digital Tools To Assess and Remedy Online Reputational Damage

Lucinda Bach, Mary Gately & Craig Kronenberger

The speed with which negative Internet postings spread can cause immediate reputational harm. To remedy this harm, the nature and extent of the damage must be quantified, which is no easy task. This is true whether a defamation lawsuit is pursued or whether a public relations strategy is used. However, new digital tools can now be used to assess and quantify damage caused by these kinds of negative Internet postings.

Features

<b><i>Online Extra:</b></i> DOJ Wants Massive Government Data Breach Suits Consolidated Image

<b><i>Online Extra:</b></i> DOJ Wants Massive Government Data Breach Suits Consolidated

Amanda Bronstad

It was the worst data breach in the history of the U.S. government, and now the Justice Department says the ensuing lawsuits filed in six different jurisdictions belong in a single court in Washington, DC.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES