Features
Unconscionable Terms Prevent Enforceability of e-Commerce Contract Clauses
e-Commerce, like traditional commerce, relies on contracts. But unlike traditional commerce, e-commerce typically relies utterly on agreements drafted and presented by one party on a 'take-it-or-leave-it' basis. The validity of such contracts arises from the recipient's 'adherence' to the terms given. These so-called adhesion contracts are enforceable, except to the extent that a court finds a term unconscionable.
Features
How to Increase Your Odds of Project Success Through the RFP Process
Are you among the majority of IT professionals who view the Request for Proposal ('RFP') as the most tedious business document ever created? The RFP itself is fairly standardized, but the process of collecting information and evaluating vendors is time-consuming and uninspiring. While there are any number of thick manuals that describe the best practices for an RFP process, this article may shed light on some 'quick wins' that will enable you to boost the efficiency of your RFP process.
Features
Ensuring Security with VoIP
Among U.S. businesses, Voice over Internet Protocol ('VoIP') is growing in popularity and will continue to do so. In-Stat predicts that two-thirds of U.S. businesses will have some form of VoIP service by 2011. When deciding to use this powerful technology, organizations should look for VoIP providers that offer specific security measures within their product to ensure that the technology is used most effectively ' and virtually without any security concerns.
Features
Can Software Be a Service?
You're probably tired of hearing the phrase 'think outside the box,' but that's an accurate characterization of 'software-as-a-service' ('SaaS'). The 'box' is the computer that sits on your desk; and SaaS is an innovative way to deliver software applications to that computer over the Internet.
Features
<b>Net News</b> Ninth Circuit Text-message Ruling Could Impact Corporate Policies
Most employees know that their bosses are usually within their rights snooping on workers' e-mail, but text messaging has been in murkier territory. A federal appeals court sought to clarify matters in a ruling last month by distinguishing between electronic communication that employers store on their servers, or pay someone to store, and communication that is contracted out to third parties.
Features
Redefining Prior Art Under Proposed Patent Reform Measures
This is the first installment of a two-part series on the proposed move from a patent system granting priority of patent rights based upon invention dates to a system in which priority is based primarily upon filing dates. This installment discusses the history behind the current first-to-invent system, the current patent reform movement, and the basic proposed change to the current system.
Features
Net News
You Tube Suit Threatens Online Communication<br>Yahoo Files Suit Against Lottery Spammers
Features
Downloading Cases Hearten the Defense
Defense lawyers in copyright infringement cases brought by members of the RIAA are trumpeting as victories three recent court decisions that rein in the association's campaign against individuals who make songs available for distribution on the Web.
Features
Secret Online Identity
Companies and their employees at times face the difficult issue of protecting themselves from cybersmears by anonymous Internet users. One of the most problematic issues is the tension between identifying what is protected speech under the First Amendment, and the standard that must be met in order to obtain the identity of an anonymous poster who has used the Internet to spread damaging statements.
Features
e-Commerce Docket Sheet
No CAN-SPAM Claims When ISP Cannot Show Real Adverse Effects<br>Court Says Departing Worker's Computer Access No CFAA Breach<br>No Impleading ISP, P2P Network on Unrelated Torts<br>Roommate Site Not Immune under CDA From FHA Claims<br>Non-residents Using Others' Trademarks for Web Traffic Answers in Owner's Forum
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- The Cost of Making PartnerMaking partner isn't cheap, and the cost is more than just the years of hard work and stress that associates put in as they reach for the brass ring.Read More ›
- Legal Possession: What Does It Mean?Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.Read More ›