Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Accidental Access, 'Catfishing' and Unsecured Wi-Fi Image

Accidental Access, 'Catfishing' and Unsecured Wi-Fi

Richard Raysman & Peter Brown

The increasing use of Web browsing and other user data has stirred some users to reconsider the unspoken "bargain" that exists on social media and other interactive websites, namely, that privacy sacrifices in the form of targeted marketing and data collection subsidize free content and services and promote a robust online ecosystem. However, beyond the larger debate over digital privacy, new practices and technologies have emerged that do not neatly fit within the boundaries of existing privacy laws.

Features

Recent Issues in Cybersquatting Disputes Image

Recent Issues in Cybersquatting Disputes

Richard Raysman & Peter Brown

There are several pressing issues within the realm of cybersquatting, including: recent heightened scrutiny applied by courts to cybersquatters and the operators who host their domains; the various methods by which companies attempt to combat the problem; and whether cybersquatting will become a substantial problem on newer platforms, such as social networking sites and on the forthcoming new gTLDs.

Features

Spotlight on 3D Printing: Intellectual Property Image

Spotlight on 3D Printing: Intellectual Property

Julie N. Matthews

3D printing technology, also known as additive manufacturing, is nothing new. It has been used for decades by designers and engineers. But the technical capabilities that make 3D printing technologies so useful likely will facilitate intellectual property infringement.

Features

Maddeningly Mismated Matches Image

Maddeningly Mismated Matches

Jonathan Moskin

In paired opinions rendered the same day by the same judge, the Ninth Circuit reached seemingly directly contrary conclusions in virtually identical cases concerning the balancing of intellectual property rights and First Amendment interests.

Features

FACE Act Introduced Image

FACE Act Introduced

Bradley S. Shear

The Forbidding Advertisement Through Child Exploitation Act (FACE Act) of 2013 was introduced in Congress on July 10, 2013 by U.S. Congressman John J. Duncan, Jr. (R-N) to help protect the personal privacy of children and teens.

Features

Forensic and e-Discovery Tools to Help Win Your Case Image

Forensic and e-Discovery Tools to Help Win Your Case

Richard D. Lutkus

Winning or losing your client's case often rests on your ability to prove facts that support your client's position. Subject-matter expert witnesses play a prominent role in interpreting the facts available to them and helping the trier of fact reach a conclusion on the meaning of such information. Forensic and e-discovery experts are no different than any other experts in that their opinions can only be as solid as the information they can find and analyze.

Features

FTC Warns Big Data Companies on Consumer Privacy Image

FTC Warns Big Data Companies on Consumer Privacy

Andrew Ramonas

Federal Trade Commission Chairwoman Edith Ramirez last month issued a stern warning to U.S. companies that house vast amounts of consumers' personal data: Watch out.

Features

Open Source Code Attribution in a Remix World Image

Open Source Code Attribution in a Remix World

Alexandra Lyn

The landscape of software development and distribution is changing. Traditionally a closed-off proprietary process, developers and businesses alike are quickly realizing the many advantages that flow from the adoption of a more collaborative open source approach.

Features

Your Business: Someone Online Hates You Image

Your Business: Someone Online Hates You

Josh King

As word of mouth moves online, lawyers occupy the same place today that hotels were in a decade ago: just starting to face the prospect of widespread use of online user reviews, and concerned that such reviews will crater their businesses. The following 10 tips will put these concerns into context and explore which methods of responding to negative feedback are effective and ethical and which ones aren't.

Features

e-Mail Troll Hushed Image

e-Mail Troll Hushed

Ari N. Rothman

A federal judge recently ruled that an Internet service provider is barred from pursuing claims for alleged violations of the California and Maryland anti-spam statutes because it existed primarily and substantially to collect e-mails it believed to be spam and sue over it, and because it consented to receive the e-mails over which it sues.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES