Features
Insurance Coverage Disputes over Data Breaches
Each day, businesses become progressively more dependent on computers and the Internet to gather, store and protect information. But, as sophisticated as this technology may be, it has also proven to be susceptible to breaches, which have time and again resulted in the unauthorized access of confidential information.
Features
Establishing A Web Presence After A Merger
Merger activities typically disrupt "business as usual" and result in more questions than answers. This was particularly true when the law firms of Edwards Angell Palmer & Dodge LLP and Wildman Harrold Allen & Dixon LLP merged in 2011. Edwards Wildman's marketing efforts, specifically our online and digital Web presence, were quickly devoted to achieving a cohesive "one voice, one brand, one solution" approach, as we set out to redesign our website and digital persona.
Features
<i>Aereo</i>: The Uncertain Limits of What the Supreme Court Decided
On June 25, 2014, a 6-3 majority of the U.S. Supreme Court held that Aereo's streaming service ' which allowed customers to view over-the-air TV broadcasts via the Internet ' violated the broadcasters' public performance right under the Copyright Act. Applying what the dissent derided as "an improvised standard ('looks-like-cable-TV')," the majority held that Aereo infringed copyrights owned by the television networks.
Features
Peer-to-Peer Networks
Peer-to-peer e-commerce platforms seem to be popping up almost daily, touching nearly every vertical ripe for disruption, or at least providing just a little grease for the wheel.
Features
Redaction: What You Need to Know
While the term <i>redaction</i> is well known in the legal community and government agencies, the term itself is new to those not in the fields mentioned above. Because of improper redaction making its way into the headlines, more and more people are seeing the term.
Features
Hulu Privacy Class Action Can Move Forward
With eye-popping damages at stake, a federal magistrate refused to allow consumer plaintiffs to move forward as a class with claims that Hulu violated their privacy by sharing the videos they viewed.
Features
Protecting Law Firms from Increasing Cyberattacks
Cyberattacks are increasing at a startling rate in the business community, not only by hackers for personal intellectual skullduggery, but cyberattacks aimed at obtaining sensitive information. Law firms have become major targets of these illegal attacks, which are aimed at discovering and pilfering the entire subject matter of a commercial operation.
Features
Big Data and Regulation
Big data has taken the world by storm. From its origins as a technical solution for Internet search engines and online retail sales, it has spread across business, science and now government. Big data tools have shown extraordinary power to quickly sort and analyze data, both structured and unstructured. Ultimately, the power of big data resides in its ability to identify signals or patterns in vast data sets.
Features
Proposed Class in Hulu Privacy Suit Needs Objective Data
With eye-popping damages at stake, a federal magistrate refused to allow consumer plaintiffs to move forward as a class with claims that Hulu violated their privacy by sharing the videos they viewed.
Features
Lawyers or Technicians: Who Make Better e-Discovery Project Managers?
The demand for e-discovery project managers is extreme, thus the bulk of career opportunities for e-discovery professionals are in project management. But not every e-discovery project manager has the same background or is even the same type of project manager.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business AlliesPractical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.Read More ›
- Issues in Reverse Morals Clauses In Talent Influencer Contracts With Product BrandsThe next company general counsel to slide a morality clause across the desk for a celebrity or web influencer to sign shouldn't be surprised if that talent also whips out a morals clause, one to cancel the contract if the company's brand acts immorally.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›