Features
Data Encryption And the Law
This article discusses several of the pressing matters within the realm of data encryption, including: the Constitutional concerns that arise when an individual is forced by the government to divulge encrypted data; the recent disclosures in the press of government involvement with encrypted data; and the current global legal climate in which these issues are situated.
Features
<b><i>Online Extra</b></i> Social Media Privacy Laws and the Financial Industry
Many employers use publicly available Facebook pages, Twitter feeds, and other social media outlets as screening tools for job applicants. And they may also use them as a way to monitor employees. After all, a picture is worth a thousand words. A handful of employers, however, have pushed their due diligence even further than standard Internet searches.
Features
It's a Licensee Eats Licensee World. Or Is It?
With the predominance of Internet marketing now continuously eroding what might be considered the traditional geographic "territories" of different licensees, the potential for conflict only becomes more acute.
Features
Third Circuit Keeps Objective Standard to Weigh Facebook Threats
Prompted by a case involving threats made on Facebook, the Third Circuit has ruled the objective-intent standard for assessing threats still stands.
Features
Combating Big Data with a 'Facts First' Approach to e-Discovery
The ability to quickly identify relevant electronically stored information when litigation or regulatory action arises. This challenge has been significantly exacerbated by the arrival of "Big Data." This problem must be addressed holistically and aggressively with a combination of human intelligence, legal process and advanced information retrieval technology. Taken together, this approach represents a "Facts First" intelligence-gathering methodology that allows legal teams to identify, analyze and defensibly reduce ESI volumes.
Features
ICANN's Trademark Clearinghouse Sees Slow Initial Take-up
Later this year, the Internet is set to undergo a series of new and drastic changes with the first rollout of hundreds of new generic Top Level Domains (gTLDs). However, there is still a significant lack of participation from many top businesses that have yet to register and, as a result, are at greater risk of intellectual property infringement and potentially putting consumers at risk as well.
Features
Nine Key Steps In a Proactive Cybersecurity Review
Securing your company's network and protecting your valuable data is difficult enough in today's Internet-driven economy. But to be treated by regulators and courts like an accessory to the crime after you've been hacked is truly adding insult to injury.
Features
Bloggers Want Same Rights as Mass Media
Bloggers, claiming that no distinction exists between blogs and traditional media, are seeking protection afforded by the First Amendment rights previously reserved for traditional media outlets. However, most courts do not afford bloggers the same rights given to traditional media.
Features
Word File Types and Compatibility
This column addresses the new compatibility features of Microsoft Office Word 2013.
Features
e-Discovery Platforms Are Not All the Same
The value of e-discovery technology varies, depending on a number of factors, including the provider that is hosting the data, the quality of technical support and the nature of the matter at hand. For that reason, there is no single one-size-fits-all platform.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business AlliesPractical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.Read More ›
- Issues in Reverse Morals Clauses In Talent Influencer Contracts With Product BrandsThe next company general counsel to slide a morality clause across the desk for a celebrity or web influencer to sign shouldn't be surprised if that talent also whips out a morals clause, one to cancel the contract if the company's brand acts immorally.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›