Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

'Digital Dive:' How to Use Reverse SEO to Suppress Negative Content in Search Engines Image

'Digital Dive:' How to Use Reverse SEO to Suppress Negative Content in Search Engines

Marguerita Cheng

Reverse SEO is part of a firm's online reputation management strategy that suppresses negative content such as bad service reviews in search engines so that potential clients and partner companies will have difficulty finding it.

Features

Patent Eligibility of User Interfaces Image

Patent Eligibility of User Interfaces

Lawrence H. Aaronson & James L. Korenchan

<b><i>Advances in UI Design Can Provide Key Competitive Differentiation and Advantage, Which Makes Protecting Them Critically Important from a Business Perspective</b></i><p>Advances in UI design can also provide key competitive differentiation and advantage, helping to distinguish otherwise commoditized products and services such as computers, Web services, wearables, and appliances. Given this advantage, protecting advances in UI design can also be critically important from a business perspective.

Features

Social Media Scene: How to Compel Your Staff to Share Your Firm's Social Media Posts Image

Social Media Scene: How to Compel Your Staff to Share Your Firm's Social Media Posts

Spencer X. Smith

Consider advocating for your employees first before you ask them to advocate for you. Give your employees a reason to care.

Features

General Data Protection Regulation: Defense or Offense? Image

General Data Protection Regulation: Defense or Offense?

Nina Cunningham

Ostensibly, GDPR's mission is to strengthen and unify the EU's protection of online privacy rights and promote data protection for citizens of the 28 countries currently in the EU. In the global economy, however, GDPR serves as an alarm to all countries with business flowing across Europe and well beyond. Where business flows, data follow.

Features

Measuring Success in Cybersecurity Image

Measuring Success in Cybersecurity

Chris Moschovitis

Cybersecurity concerns are akin to health concerns. You can practice a healthy lifestyle; you can get regular medical check-ups; you can be vigilant in monitoring your own body. Still, the question remains, “How do I know I'm healthy?” The answer is, “You don't.”

Features

Five Takeaways from Recent Cybersecurity Developments by Colorado and the SEC Image

Five Takeaways from Recent Cybersecurity Developments by Colorado and the SEC

Brian Neil Hoffman

Colorado recently adopted a new law expanding companies' obligations in the event of a cybersecurity incident, and establishing new data security and disposal obligations. Recent announcements by the SEC likewise emphasize important responsive points for both companies and their personnel in the wake of an incident. Five key takeaways from these developments are highlighted in this article.

Features

Is Gmail's New Ephemeral Messaging Service a Threat to Data Retention? Image

Is Gmail's New Ephemeral Messaging Service a Threat to Data Retention?

Rhys Dipshan

Despite some potential problems with widespread use of Gmail's 'confidential mode,' the new ephemeral messaging function can be easily managed from an information governance perspective.

Features

Legal Tech: Approaches and Considerations for Discovery Cost Minimization and Recovery Image

Legal Tech: Approaches and Considerations for Discovery Cost Minimization and Recovery

John Koss & Daniel Pelc

The costs of litigation increase with ever more potentially responsive data, litigation technology options, and a truly global reach in the context of much litigation. In response, law firms must continue to consider viable approaches to broaching discussions surrounding the recovery of these costs both within the firm and, more importantly, with law firm clients.

Features

Compensation Issues from Cancelled Roseanne TV Show Image

Compensation Issues from Cancelled Roseanne TV Show

Michael I. Rudell & Neil J. Rosini

It is rare that a hit network television series is cancelled, as recently occurred with the ABC series <i>Roseanne</i>. But when that happens, the immediate and long-term implications for the network, producers, talent and other entities related to the series can be significant.

Features

Case Study: How Momkus McCluskey Virtualized Its IT for Better Security and Productivity  Image

Case Study: How Momkus McCluskey Virtualized Its IT for Better Security and Productivity 

Jennifer Friedland

Whatever direction we went with our IT, we wanted to make sure we would be following the absolute best practices from a security perspective. I needed to know that our data would be safe, secure, as well as fully backed up in case something went wrong.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES