Mondaq USA: Media, Telecoms, IT, Entertainment > IT and Internet
Reed Smith
Does the Communications Decency Act (CDA) provide immunity to a website against allegations that its design and operation enabled a third party to buy a gun, which the third party
BakerHostetler
Bose Corporation is a true American success story. Bose was founded in 1964 by Amar Gopal Bose, the American son of a refugee Bengali freedom fighter,
BakerHostetler
We cover children's privacy and advertising weekly. However, in light of COPPA's recent 20th anniversary,
Marshall, Gerstein & Borun LLP
In an article published in Law360 on April 26, Joseph A. Saltiel discusses seven non-Alice items that must be considered for software patents.
Lewis Brisbois Bisgaard & Smith LLP
Each year, companies wisely invest in advanced perimeter security devices and software to secure their electronic data and thwart cyber attacks.
Klein Moynihan Turco LLP
The FTC has settled its first CRFA violation investigations. Enacted in December of 2016, the CRFA prohibits businesses from offering provisions in form contracts that prevent customers from publicly expressing...
Fenwick & West LLP
The original impetus was this AP article in which I had been quoted about missing White House emails during George W. Bush's administration.
Reed Smith
The U.S. Department of Health and Human Services ("HHS") filed a Notice of Enforcement Decision (the "Notice of Enforcement") on April 26, 2019
Proskauer Rose LLP
This month, an Illinois district court considered another in the series of web scraping disputes that have been working their way through our courts.
Frankfurt Kurnit Klein & Selz
As a result, Facebook has taken down over 100 accounts, pages and groups associated with this fraudulent activity.
Lowndes, Drosdick, Doster, Kantor & Reed, P.A.
Protecting against supplier failures during the development process is a continuing challenge, but particularly so when proper consideration is not given to the impacts of such failures and steps
Lewis Brisbois Bisgaard & Smith LLP
One of the best qualities an information technology (IT) professional can possess is the tenacity to fully troubleshoot and resolve system issues as they occur.
BakerHostetler
Forensics are a key component of many data incident investigations. The importance of forensics cannot be overstated.
Foley & Lardner
Darkreading.com reported big "cybersecurity challenges aren't limited to large organizations. Small and medium-sized organizations are subject to the same vulnerabilities, exploits,
Mintz
Office Depot and its tech support provider, Support.com, proved to be anything but "supportive" after allegedly providing false malware scan results and conning customers into paying for repairs and technical services...
Duane Morris LLP
We keep hearing about how teenagers have gone inward. They spend more and more time staring into their televisions, computers and handheld devices
Klein Moynihan Turco LLP
This week, the Federal Trade Commission ("FTC") announced that it had reached a settlement of charges that it had brought against a company and its owner for practices that the FTC alleged violated
Arnold & Porter
US Privacy State Of Play In 2019: In The Age Of Iot, How Will Policymakers Strike The Balance Between The Freedom To Innovate And The Need To Regulate.
Frankfurt Kurnit Klein & Selz
Virtual cupids. It sounds so romantic. But what was at issue in this case was anything but: whether an email service provider could recover as an "internet service provider" against a company flooding its customers' in-boxes with x-rated emails.
Proskauer Rose LLP
Thus, the Court found a sufficient enough nexus between Domino's website and app and its offered goods and services to determine that the ADA did indeed apply.
Latest Video
Most Popular Recent Articles
Jones Day
Data privacy- and security-related class actions appear to be on the rise, and effectively defending them requires the right mix of substantive and procedural knowledge.
Berman Fink Van Horn P.C.
On September 28th, California passed the first law in the country designed to address the security of internet-connected devices, more commonly known as the Internet of Things (IoT).
Seyfarth Shaw LLP
On June 5, the private body of web accessibility experts called the World Wide Web Consortium (W3C) published its update to the Web Content Accessibility Guidelines 2.0 ...
Lowndes, Drosdick, Doster, Kantor & Reed, P.A.
Protecting against supplier failures during the development process is a continuing challenge, but particularly so when proper consideration is not given to the impacts of such failures and steps
Arnold & Porter
US Privacy State Of Play In 2019: In The Age Of Iot, How Will Policymakers Strike The Balance Between The Freedom To Innovate And The Need To Regulate.
Mintz
Office Depot and its tech support provider, Support.com, proved to be anything but "supportive" after allegedly providing false malware scan results and conning customers into paying for repairs and technical services...
Klein Moynihan Turco LLP
This week, the Federal Trade Commission ("FTC") announced that it had reached a settlement of charges that it had brought against a company and its owner for practices that the FTC alleged violated
Reed Smith
The U.S. Department of Health and Human Services ("HHS") filed a Notice of Enforcement Decision (the "Notice of Enforcement") on April 26, 2019
Mintz
Last week, the OIG for the DHHS issued a favorable Advisory Opinion regarding a proposal by a pharmaceutical manufacturer to loan a limited-use smartphone to financially needy patients taking the digital version of...
Lewis Brisbois Bisgaard & Smith LLP
One of the best qualities an information technology (IT) professional can possess is the tenacity to fully troubleshoot and resolve system issues as they occur.
Article Search Using Filters
Related Topics
Mondaq Advice Center (MACs)
Popular Authors
Popular Contributors
Up-coming Events Search
Tools
Font Size:
Translation
Channels
Mondaq on Twitter
Partners
In association with