Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Is Google Enabling Illegal Ads That May Harm Children? Image

Is Google Enabling Illegal Ads That May Harm Children?

Bradley S. Shear

Advertisements for counterfeit merchandise, illegal drugs, pornography, etc, have been on the Internet for years. Unfortunately, it appears some companies that have the ability to remove ads and/or links from their websites to illegal products and/or services may not be putting forth their best effort to do so. Refusing to properly address these issues may lead to major legal and financial consequences.

Features

Taming the Beast: Information Management and Governance in a Global Environment Image

Taming the Beast: Information Management and Governance in a Global Environment

Laurie Fischer & Heather Yanak

Part One of this article examined the catalysts motivating companies to take charge of their information and the need to develop a comprehensive information governance approach to support their objectives. This month, we look at policy and procedures development, the role of technology, document disposition, and the importance of change management.

Features

Attorneys as Technologists Image

Attorneys as Technologists

Alison Grounds

With the continued growth in the volume of ESI involved in even the smallest of matters, we made a big decision ' to create Troutman Sanders eMerge, a wholly owned subsidiary of the firm dedicated to consulting, project management, and technology services related to ESI in litigation and internal/governmental investigations.

Features

Computers in Their Pockets Image

Computers in Their Pockets

Eric Killough

Our clients carry in their pockets ' into and out of their homes and offices ' more personal electronic information than most of us held in our desktop machines just a decade ago. Much of this data is personal and irrelevant to litigation, some of it is relevant but harmless, and an unquantifiable amount of it is potentially damning.

Features

Document Exchange Breaches Image

Document Exchange Breaches

Charles Magliato

Think about the last case you handled for your largest client. What would happen if that information was breached or hacked? It is an alarming possibility and one that should rightfully occupy your thoughts.

Features

New GTLDs Law Strategy for Business Image

New GTLDs Law Strategy for Business

David K. Mitnick

In the very near future, ICANN's plans will come to fruition, as a number of the applications have passed through the ICANN internal review process and should be online in the next month or two. ICANN is anxious to get the first uncontested international TLDs online to show that they are making progress and the program is working, and that it is a critical part of the ICANN multi-stakeholder model.

Features

The Perks of Using Avvo Ignite Image

The Perks of Using Avvo Ignite

Robert S. Bennett, David Sickles

Keeping up with calls, e-mails, and other inquiries can be a difficult proposition in any business. Those in the legal industry know this challenge perhaps more than most. Bob Bennett & Associates is a Houston law firm that deals primarily with professional ethics and licensing issues. We provide free consultation to people who are experiencing trouble with a licensing agency, and keeping up with the volume of calls that are received per day can be…

Features

What's New in Word 2013: First Look Image

What's New in Word 2013: First Look

Sue Hughes

A guide to the new version of Word.

Features

FTC Warns Companies of Children's Privacy Violations Image

FTC Warns Companies of Children's Privacy Violations

Jenna Greene & Catharine Dunn

On May 15, the Federal Trade Commission (FTC) sent letters to more than 90 businesses, informing them that they could potentially be in violation of the Children's Online Privacy Protection Act (COPPA) when changes to the law go into effect on July 1.

Features

Using IP to Prevent Negative UGC Comments Image

Using IP to Prevent Negative UGC Comments

Stephen M. Kramarsky

Smart companies understand that the power of user generated content (UGC) is that it is at least somewhat out of control. They craft their brand strategies accordingly, using social media to address customer concerns directly and publicly, rewarding social media influencers and picking their battles. But still, the courts remain full of litigants who do not seem to get the message. In particular, some businesses continue to attempt to use intellectual property law to stop customers from sharing their experiences on the Internet.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES