Search Results (4481)
Documents on internet e commerce
Show: results per page
|United States to Relinquish Remaining Control of the Internet and Oversight of the Internet Corporation for Assigned Names and Numbers (ICANN)|
Adam R. Bialek, Gregory N. Brescia; Wilson Elser Moskowitz Edelman & Dicker LLP;
March 19, 2014, previously published on March 18, 2014On Friday, March 14, 2014, after a little more than 15 years of control, the United States National Telecommunications and Information Administration (NTIA) announced its intention to relinquish its remaining control of the Internet and oversight of the Internet Corporation for Assigned Names and...
|Cybersecurity Assessments - Using the Tool Well|
Michael J. Baader, Jamie Barnett, David M. DeSalle, Anthony J. Rosso, Bobby N. Turnage; Venable LLP;
March 19, 2014, previously published on March 17, 2014Are you considering a cybersecurity assessment? If you heard Venable's presentation, "New Cybersecurity Framework Released: What You Need to Know," you might be.
|Plan Now for Changes in Emailing Canadians|
Andrew B. Lustigman; Olshan Frome Wolosky LLP;
March 18, 2014, previously published on March 6, 2014Marketers who email Canadian residents need to plan now for a soon to be effective Canadian version of the CAN-SPAM Act that has some important differences from the U.S. version of the law. Unlike the United States, which operates on a notice of an opt-out paradigm, the Canadian law requires an...
|Combating the Sale of Counterfeit Goods Online: Don’t Let Someone Get Away with Selling Knockoffs of Your Products|
Jordan S. Cohen, Whitney C. Gibson, James W. Kelly; Vorys, Sater, Seymour and Pease LLP;
March 18, 2014, previously published on March 14, 2014Trademark counterfeiting, in general, refers to the placement of a trademark on a product that is not the legitimate product offered by the trademark owner. Meanwhile, the Lanham Act - the U.S. federal trademark statute - defines a counterfeit as “a spurious mark that is identical with, or...
|Yahoo! Unhappy With TCPA Ruling; Seeks Reconsideration|
Scott A. Shaffer; Olshan Frome Wolosky LLP;
March 18, 2014, previously published on March 6, 2014In Sherman v. Yahoo! Inc., decided on February 3, 2014 in the Southern District of California, Yahoo! failed to convince the court that a lawsuit against it should fail because Yahoo! did not use an Automatic Telephone Dialing System (ATDS) to send text messages, as that term is defined under the...
|California Attorney General Urges Companies to be Prepared for Cyber Attacks and Security Breaches|
Kenneth R. Florin, Ieuan Jolly, Michael L. Mallow, Nerissa Coyle McGinn, James D. Taylor; Loeb & Loeb LLP;
March 18, 2014, previously published on March 2014Kamala Harris, California's Attorney General, issued a set of recommendations for preventing and responding to cyber attacks and security breaches. The recommendations, called Cybersecurity in the Golden State, are directed to small and medium-sized businesses, which often lack the resources of a...
|To Native or Not to Native, That Is the Question|
Licyau Wong; Foley & Lardner LLP;
March 18, 2014, previously published on March 14, 2014Here at IT-Lex, we write a lot about the form of producing documents. (For instance, see here, here, here, and here) Producing in TIFF format has long been the standard-bearer in electronic discovery, while PDFs are a second-favorite. However, these are not the only two options a lawyer has when...
|EEOC Holds Public Meeting On Social Media In The Workplace #socialEEOC|
Kohrman Jackson Krantz PLL;
March 17, 2014, previously published on March 13, 2014Yesterday, the EEOC held a public meeting on the use of social media in the workplace, and its impact on the enforcement of equal employment opportunity laws. The commission heard testimony that addressed issues such as recruitment and hiring, harassment, and discovery.
|Imitation Protection of Internet Sites by Copyright Law|
Michael Rainer, Michael Rainer; GRP Rainer LLP;
March 17, 2014, previously published on March 14, 2014The operator of an Internet address has, as a rule, a special interest in the protection of his advertising appearance on the Internet against imitation. However, such a protection, from the copyright law, is guaranteed only up to a certain creation/design point.
|Boston Discussion - NIST Framework - March 25|
Mintz Levin Cohn Ferris Glovsky Popeo P.C.;
March 17, 2014, previously published on March 4, 2014The National Institute of Standards and Technology (NIST) last month released its final Cybersecurity Framework. Developed under an executive order from President Obama with extensive input and feedback from industry security professionals, the new NIST framework is designed to help companies in...