Most Popular Technology Blawgs Expanded View List View

Blogs 136 - 180 of 259
Sorted by Popularity | Sort by Name | Sort by Last Post Date
Today | This Week | This Month | All Time |

Jason the Content Librarian

Jason the Content Librarian

Covers technology, libraries, and the Internet. By Jason Eiseman.

http://www.jasoneiseman.com/blog
  • Feb 23

    E-Book Lending Program from Internet Archive & Partner Librarie

    E-Book Lending Program from Internet Archive & Partner Librarie
    ReadWriteWeb is reporting that “Internet Archive Partners With 150 Libraries to Launch an E-Book Lending Program.”
  • Feb 17

    Video: Watson and Law Librarian

    Video: Watson and Law Librarian
    Following up on my post yesterday, I have been thinking for awhile about adding more video to this blog. The problem is getting the motivation during busy work times to create the content can be difficult. However, I think I’ve come up with…
  • Feb 16

    I, for one, welcome our new robot overlord

    I, for one, welcome our new robot overlord
    Everyone is busy imagining why the IBM computer Watson is so important to their own industry. Robert C. Weber writes in the National Law Journal about how great it will be when computers like Watson can perform legal research on their own.
Rank this Week: 1819

Lawgarithms

Lawgarithms

Issue-spotting the Live Web. Covers blogging, copyright, licenses, privacy, software, syndication and more. By Denise Howell.

http://www.zdnet.com/blog/howell/
  • Nov 16

    Touched by the TSA

    Touched by the TSA
    Stop the security line, I want to get off. And I’m taking my kid with me.
  • Nov 16

    Touched by the TSA

    Touched by the TSA
    Time was when having "the talk" with your kids meant the birds and the bees. Nowadays parents also have to be ready to explain shoe- and underwear-bombers, molotov toothpaste, and the touchy-feely TSA.
  • Nov 16

    Touched by the TSA

    Touched by the TSA
    Time was when having "the talk" with your kids meant the birds and the bees. Nowadays parents also have to be ready to explain shoe- and underwear-bombers, molotov toothpaste, and the touchy-feely TSA.
Rank this Week: 1544

Practicing Law in the 21st Century

Practicing Law in the 21st Century

Covers technology and the legal profession. By Nicole Black, Matthew Lerner and Gregory Bell.

http://21stcenturylaw.wordpress.com
  • Apr 12

    Follow my posts at my Sui Generis blog

    Follow my posts at my Sui Generis blog
    I’ve decided to stop cross-posting content both here and at my Sui Generis blog and will only be posting at Sui Generis from now on. But, rest assured, all of the content that I posted here is also posted at Sui Generis, so if you don’t…
  • Apr 7

    Different Strokes for Different Folk

    Different Strokes for Different Folk
    This week’s Daily Record column is entitled “Different Strokes for Different Folks” A pdf of the article can be found here and my past Daily Record articles can be accessed here. ***** Different Strokes for Different Folks During …
  • Apr 5

    Webinar: Preview of my New Book “Social Media for Lawyers” at 4/6 1pm EST

    Webinar: Preview of my New Book “Social Media for Lawyers” at 4/6 1pm EST
    Tomorrow, Tuesday April 6th at 1 pm EST Avvo is hosting a preview webinar of “Social Media for Lawyers: the Next Frontier,” my new book co-authored with Carolyn Elefant that will be published later this month by the American Bar…
Rank this Week: 1709

Rory Perry's Weblog

Rory Perry's Weblog

Covers law, technology, and the courts. By the Clerk of the Supreme Court of Appeals of West Virginia.

http://radio-weblogs.com/0103705/
  • Sep 24

    Summaries of first opinion in Fall 2009 term posted

    Summaries of first opinion in Fall 2009 term posted
    I just posted summaries of the first four opinions, issued today, for cases argued in the Fall 2009 term of court. This term I am trying to issue the summaries as close to the opinion release time as feasible. Today I got lucky.
  • Sep 16

    I'm back

    I'm back
    After nearly a year of not posting, here we go again . . .
  • Oct 16

    Recent rules activity - Mass Litigation Panel; changes to Rule 3(a) of the Rules of Civil Procedure

    Recent rules activity - Mass Litigation Panel; changes to Rule 3(a) of the Rules of Civil Procedure
    On October 9, 2008, the Court approved four rule changes related to mass litigation that become effective immediately. Those changes are: Amendments to Trial Court Rule 26: These amendments relate to the Mass Litigation Panel, referral of…
Rank this Week: 1848

Tablet PC Lawyer Blog

Tablet PC Lawyer Blog

Offers news about the Tablet PC and the experiences of a Georgia family law attorney using one. By Stephen Worrall.

http://www.tabletpclawyer.com/
  • Feb 15

    Microsoft Invents a Reason to Buy a Tablet

    Microsoft Invents a Reason to Buy a Tablet
    Why would anyone want to buy a Tablet PC? Tablet devices are perceived as little more than heavy and slow laptops with small screens and large price tags. The payoff? You get to write on them with a stylus and take notes as if you're…
  • Dec 31

    Series of Videos on Using Tablet PC'

    Series of Videos on Using Tablet PC'
    Here is a series of video tutorials on using a tablet pc: Tutorial Part 1: This is the first video from ICON Pareto showing you how to use the basic functions of your tablet PC. Tutorial Part 2: In this video Starla shows you how to…
  • Dec 31

    Series of Microsoft Videos on OneNote

    Series of Microsoft Videos on OneNote
    Here is a series of funny commercials by Microsoft about OneNote 2003, found now on YouTube: Let's face it. Stationery isn't very good. And when it comes to note taking, it just isn't up to the job.That's why we created Microsoft® Office…
Rank this Week: 2120

Privacy & Security Matters

Privacy & Security Matters

By Mintz, Levin, Cohn, Ferris, Glovsky and Popeo, P.C.

http://www.privacyandsecuritymatters.com
  • Apr 1

    Breaking News: Executive Order Signed Relating to “Significant Malicious Cyber-Enabled Activities”

    Breaking News: Executive Order Signed Relating to “Significant Malicious Cyber-Enabled Activities”
    President Obama today signed an Executive Order granting authority to the Department of the Treasury’s Office of Foreign Assets Control (OFAC) to impose sanctions on individuals and entities determined to be “responsible for…
  • Mar 27

    Responding to Insider Data Theft

    Responding to Insider Data Theft
    Our 2015 monthly Privacy Issues Wednesday webinar series continued this month with Jonathan Cain and Paul Pelletier’s Responding to Insider Data Theft & Disclosure presentation.  Jonathan and Paul discussed how distinguishing…
  • Mar 26

    Cross-Device Tracking: The New World

    Cross-Device Tracking: The New World
    Facebook does it.  Google does it.  It’s everywhere in the mobile ad ecosystem.  And your smartphone does it often than you know, according to a study released on Monday by Carnegie Mellon. Now, Federal authorities…
Rank this Week: 4670

Michael Smith's Law Blog

Michael Smith's Law Blog

A legal blog written by a recent graduate of UCLA School of Law. Posts cover a wide range of topics, but areas of focus include criminal law, constitutional law, law and technology, and commentary on scholarship and legal education.

http://www.smithblawg.blogspot.com
  • Apr 1

    Firearms in Student Housing: California Penal Code 626.9 and the Second Amendment

    Firearms in Student Housing: California Penal Code 626.9 and the Second Amendment
    I visited UCLA last weekend. While I was there, I visited Weyburn Terrace, an apartment complex for UCLA graduate students. UCLA's website describing the housing is here. In a nutshell, Weyburn Terrace consists of apartment-style housing for…
  • Mar 31

    Silk Road Investigators Charged With Money Laundering and Wire Fraud

    Silk Road Investigators Charged With Money Laundering and Wire Fraud
    From the New York Times:On the so-called dark web, drug dealing and other illicit sales have thrived in recent years, the authorities have said, through hidden websites like Silk Road and hard-to-trace digital currencies like…
  • Mar 30

    Kerr on The Influence of Immanuel Kant on Evidentiary Approaches in Eighteenth Century Bulgaria

    Kerr on The Influence of Immanuel Kant on Evidentiary Approaches in Eighteenth Century Bulgaria
    A while ago, I wrote about Adam Liptak's criticism of law reviews, and argued that Liptak's criticism lacked novelty. I also did some research into a quote by Chief Justice Roberts on law reviews. That quote is:Pick up a copy of any law…
Rank this Week: 3113

Digital Rights Ireland

Digital Rights Ireland

Covers data retention, defamation, DRI, DRM, ID cards, intellectual property, mass surveillance and more.

http://www.digitalrights.ie/blog/
  • Apr 1

    DRI’s Submission to the Law Reform Comission on Cyberbullying and Harassment

    DRI’s Submission to the Law Reform Comission on Cyberbullying and Harassment
    The Law Reform Commission is now working on the area of “cyber-crime affecting personal safety, privacy and reputation including cyber-bullying” – a wide ranging area including “revenge pornography”, hate crime…
  • Mar 31

    Two Weeks until Digital Rights Europe, the DRI Conference

    Two Weeks until Digital Rights Europe, the DRI Conference
    DRI is delighted to be welcoming a world-class line-up of international and domestic experts to Digital Rights Europe 2015, our inaugural conference focused on the most critical European-wide issues around digital privacy,…
  • Mar 30

    A Very Big Case: Schrems, Facebook, Safe Harbor and the CJEU

    A Very Big Case: Schrems, Facebook, Safe Harbor and the CJEU
    What has become a very big case began as a row in Ireland. Max Schrems wasn’t convinced that when his data was transferred from the EU to the US by Facebook, it was being given adequate protection. Since Facebook’s European…
Rank this Week: 2608

Privacy Law Blog

Privacy Law Blog

Covers data privacy, identity theft, invasion of privacy, and national security legal issues. By Proskauer Rose LLP.

http://privacylaw.proskauer.com/
  • Mar 31

    How Safe? – The Future of the US-EU Safe Harbor

    How Safe? – The Future of the US-EU Safe Harbor
    Michelle Gyves The US-EU Safe Harbor has been back in the news recently as Germany’s data protection commissioners met at the end of January and expressed impatience at the delay in implementing what many view as necessary reforms to…
  • Mar 20

    OCR’s Enforcement of HIPAA’s Privacy and Security Rules Continues with Robust 2014

    OCR’s Enforcement of HIPAA’s Privacy and Security Rules Continues with Robust 2014
    Douglas Dahl With the news of the recent cyber-attack and resulting data breach at health insurance giant Anthem Inc., the buzz around data security and privacy is again high.  The Anthem breach serves as a reminder to those entities…
  • Mar 20

    When is Data Security “Unfair”?

    When is Data Security “Unfair”?
    David Munkittrick Data security is big news. And so is the Federal Trade Commission (“FTC”). Put the two together in a crucible of litigation, and it is sure to be a blockbuster. That is what the closely-watched case FTC v.…
Rank this Week: 4441

Lachance on Law

Lachance on Law

Covers the access and use of online legal information. By Colin Lachance, President of the Canadian Legal Information Institute (CanLII).

http://lachanceonlaw.wordpress.com/
  • Mar 31

    Is law school debt an access to justice issue? Yes.

    Is law school debt an access to justice issue? Yes.
    Tonight at the University of Ottawa facuty of law a discussion of this topic is underway. Students, lawyers, LSUC bencher candidates and others are examining the question and discussing what should be done. Follow #LSbencher on Twitter to…
  • Feb 23

    Why I’m running in the LSUC Bencher Election

    Why I’m running in the LSUC Bencher Election
    In my role at CanLII, I’ve had the great honour of meeting and working with justice system participants from across the country as well as with benchers and law society staff from every Canadian jurisdiction. These are amazing people…
  • Feb 7

    ABS D.O.A.? idk

    ABS D.O.A.? idk
    Is the debate over Alternative Business Structures in the legal profession dead on arrival before it truly begins? I don’t know. Among the most active participants in the current debate, things are hardly over. But from my perspective,…
Rank this Week: 4796

Legal Loudspeaker

Legal Loudspeaker

Cover tech solutions and issues for law firms. By Accellis Technology Group.

http://accellis.com/blog/
  • Mar 31

    5 Basic Cyber Security Controls Every Firm MUST Have in Place

    5 Basic Cyber Security Controls Every Firm MUST Have in Place
    As we continue our discussion on what, specifically, law firms can do to create a security program, we recognize that a number of firms are still lagging when it comes to basic technical controls that play a major role in combating data…
  • Mar 26

    Win A Cyber Security & Network Assessment

    Win A Cyber Security & Network Assessment
    Take control of your network – enter to win a Cyber Security & Network Assessment from Accellis. This assessment will provide invaluable insight into your IT infrastructure – which can be used to plan your future IT direction,…
  • Mar 20

    One Simple Tool for More Powerful Searche

    One Simple Tool for More Powerful Searche
    Not too long ago, a law firm client of ours was working on a high-profile case involving an employee stealing a large sum of money from his employer through mail fraud, wire fraud, and identity theft. The defendant’s personal laptop was…
Rank this Week: 4028

The IP Stone

The IP Stone

Discusses patents, copyrights, trademarks, trade secrets, computer/Internet/cyber law. By Downs Rachlin Martin PLLC.

http://theipstone.com/
  • Mar 31

    Can your social media contacts be a trade secret of your employer? Maybe.

    Can your social media contacts be a trade secret of your employer? Maybe.
    This is a relatively new legal subject, so there isn’t much law out there.  In December, 2011, a Pennsylvania federal court answered this question in the negative.  In the case of Eagle v. Morgan, Linda Eagle, the founder of a…
  • Jan 19

    Second Strike Out for Alleged Patent Troll

    Second Strike Out for Alleged Patent Troll
    Alleged “patent troll” strikes out for second time in its efforts to have the Vermont AG’s “unfair patent enforcement” lawsuit adjudicated in federal court. In May 2013 the State of Vermont sued MPHJ Technology…
  • Nov 12

    Oracle v Google: Are APIs Copyrightable?

    Oracle v Google: Are APIs Copyrightable?
    Last month, Google asked the Supreme Court to hear its appeal of an appeals court ruling that certain application program interfaces (APIs) are copyrightable.  Oracle’s response is due in December, and the US Government may weigh…
Rank this Week: 2462

The Undeniable Ruth

The Undeniable Ruth

Covers cyberbullying and flash mobs. By Ruth Carter.

http://www.undeniableruth.com/
  • Mar 31

    Minimalist Traveling – Managing Laundry

    Minimalist Traveling – Managing Laundry
    Rolling takes up significant less space than folding. One of the downsides of rolling your clothes is you can’t have a clean clothes and dirty clothes pile in your bag and it might be hard to determine what you’ve worn –…
  • Mar 28

    When You Come to the Fork in the Road…

    When You Come to the Fork in the Road…
    I love the Yogi Berra quote, "When you come to the fork in the road, take it." It's a reminder to me to keep moving forward whether that's physically, emotionally, or professionally. When I knew I would be passing through Pasadena, I knew I…
  • Mar 25

    Burning Book

    Burning Book
    I tend to read a lot when I travel – it’s a great way to fill down time. I think every hostel I’m staying at has a book exchange where you can leave books you finish and grab new free ones if you’re so inclined.…
Rank this Week: 4428

MBBP's Good Company

MBBP's Good Company

Covers news, events and developments in business, intellectual property, employment law. By Morse, Barnes-Brown & Pendleton.

http://blogmbbp.wordpress.com
Rank this Week: 3883

North Carolina Journal of Law &…

North Carolina Journal of Law & Technology

Features legal scholarship in law and technology topics, including intellectual property law, cyberspace law, environmental law, criminal law, health law, and privacy law.

http://ncjolt.org/
  • Mar 31

    License to Build: Why Game Development Engines Are “Going Free”

    License to Build: Why Game Development Engines Are “Going Free”
    Game development engines are some of the most sophisticated software products available today, so why are so many manufacturers beginning to offer them to users for free? It takes a lot of different people to build a virtual world, including…
  • Mar 27

    Nanosized nanomaterials: how do you regulate something so tiny?

    Nanosized nanomaterials: how do you regulate something so tiny?
    On March 24, 2015, the National Organic Program (NOP) released a policy memo clarifying the status of nanotechnology in organic production and handling under the U.S. Department of Agriculture (USDA) organic regulations at 7 C.F.R.…
  • Mar 26

    The Future of Cost Concerns in Clear Air Act Regulation

    The Future of Cost Concerns in Clear Air Act Regulation
    On Wednesday, the Supreme Court heard Michigan v. Environmental Protection Agency (“EPA”). This case, an extension of previous cases regarding the Clean Air Act, is an additional challenge the Obama Administration’s ability…
Rank this Week: 4936

Law Library & Technology Blog

Law Library & Technology Blog

From the George Mason University School of Law.

http://blog.law.gmu.edu/library/
  • Mar 31

    Resources for One Ls on Bloomberg Law

    Resources for One Ls on Bloomberg Law
    Bloomberg Law has a collection of First Year Resources that students may find useful. Access this information from the Bloomberg Law homepage under “Law School Success.”
  • Mar 19

    LEXIS OFFERS “THINK LIKE A LAWYER” SERIES

    LEXIS OFFERS “THINK LIKE A LAWYER” SERIES
    Mason Law Students:  Lexis is offering “Think Like a Lawyer” Workshops. Why Attend: Skills: Practical research skills to impress your summer employer Resume Boost: Certification offered at the end of the workshop…
  • Mar 9

    SPRING BREAK LIBRARY HOURS

    SPRING BREAK LIBRARY HOURS
    Spring Break: Saturday, March 7 – Saturday, March 14 Saturday Noon – 8:00 PM Sunday Noon – 8:00 PM Monday – Thursday 8:00 AM – 9:00 PM Friday 8:00 AM – 6:00 PM
Rank this Week: 3561

Percipient E-Discovery Blog

Percipient E-Discovery Blog

A blog about e-discovery, technology and other related matters of interest.

https://percipient.co/blog
  • Mar 31

    Metadata: Can’t Always Get What You Want, Sometimes You Get What You Need

    Metadata: Can’t Always Get What You Want, Sometimes You Get What You Need
        Are litigants obligated to produce metadata in discovery (information about electronic document file attributes such as type, date of creation, author and the like)? Not always. As explained in Younes v.…
  • Mar 25

    Percipient Launches Free Automated ESI Custodian Questionnaire

    Percipient Launches Free Automated ESI Custodian Questionnaire
      Percipient is excited to announce the launch of esiquestionnaire.com, an electronic ESI custodian questionnaire that permits attorneys and their clients to efficiently identify, preserve and collect electronically stored…
  • Mar 18

    You Subpoenaed My Documents, Shouldn’t You Pay for Them?

    You Subpoenaed My Documents, Shouldn’t You Pay for Them?
    Your company just received a subpoena for a case in which it is not a party. Who covers the expense in responding to it? If the subpoena is issued in federal litigation, your company is likely responsible the cost of compliance. As recently…
Rank this Week: 2969

Internet, Information Technology…

Internet, Information Technology and e-Discovery Blog

Covers IT and internet legal issues. By Peter S. Vogel.

http://www.vogelitlawblog.com
  • Mar 31

    No Surprise – Cyberattacks are Regularly Directed at Lawyer

    No Surprise – Cyberattacks are Regularly Directed at Lawyer
    Cybercrime estimated losses are as much as $2 trillion so it is no surprise that most law firms who hold client data and intellectual property are reluctant “to publicly discuss cyberintrusions and the lack of data breach reporting…
  • Mar 27

    How Will Google Respond to Renewed Antitrust Claims in the EU & US?

    How Will Google Respond to Renewed Antitrust Claims in the EU & US?
    Estimates are that Google controls 90% of the search engine market in the EU so it is no surprise about a recent report that the “EU’s antitrust investigation into Google’s business practices [focuses on] what have been…
  • Mar 24

    Truste Pays $200,000 Fine for Breaching Contracts to Verify Privacy on 1,000+ Websites & FTC Oversight

    Truste Pays $200,000 Fine for Breaching Contracts to Verify Privacy on 1,000+ Websites & FTC Oversight
    “The Federal Trade Commission [FTC] has approved a final order resolving the Commission’s complaint against TRUSTe, Inc. for deceiving consumers about its privacy seal program”as posted on the FTC website on March 18,…
Rank this Week: 4379

Data Privacy Monitor

Data Privacy Monitor

Covers data privacy, security and social media subjects. By Baker Hostetler.

http://www.dataprivacymonitor.com/
Rank this Week: 4142

Technology Law Source

Technology Law Source

Brings together concepts that cut across traditional intellectual property lines, addressing both evolving technologies and concerns about privacy and data security. By Porter Wright.

http://www.technologylawsource.com/
  • Mar 30

    Protecting your brand in the age of gTLDs dot suck

    Protecting your brand in the age of gTLDs dot suck
    ICANN has made it possible to serve up every brand owner’s worst nightmare; welcome to [yourbrand].sucks. ICANN and registries of new gTLDs have painted a rosy picture of the new Internet landscape, advocating that the introduction of…
  • Mar 24

    Sixth Circuit adopts broad view of trade secret preemption

    Sixth Circuit adopts broad view of trade secret preemption
    The Sixth Circuit Court of Appeals recently took a broad view of preemption under the Uniform Trade Secrets Act (UTSA) and held that Ohio’s version of the UTSA preempted state-law claims for tortious interference with prospective…
  • Mar 19

    Online advertiser denied immunity under Section 230 of the CDA for permitting use of fake news sites by affiliate marketer

    Online advertiser denied immunity under Section 230 of the CDA for permitting use of fake news sites by affiliate marketer
    A federal court recently agreed with the Federal Trade Commission (FTC) that an advertiser should be held accountable for the deceptive acts and practices of its affiliate marketers, and ordered that the advertiser disgorge the entire $11.9…
Rank this Week: 3544

Workplace Privacy Counsel

Workplace Privacy Counsel

Covers employment related privacy issues. Published by Philip Gordon of Littler Mendelson's Privacy and Data Protection Practice Group.

http://www.littler.com/blog/workplace-privacy-counsel
Rank this Week: 4492

CyberInquirer

CyberInquirer

Covers developments in cyber law and insurance. By Richard J. Bortnick.

http://cyberinquirer.com
  • Mar 29

    US District Court in Pennsylvania Dismisses Data Breach Class Action on Article III Standing

    US District Court in Pennsylvania Dismisses Data Breach Class Action on Article III Standing
    In Storm & Holt v. Paytime, Inc., 1:14-cv-01138-JEJ (MD Penn. Mar. 13, 2015), the United States District Court for the Middle District of Pennsylvania addressed the Article III standing issue of when a cause of action may exist for a…
  • Mar 9

    US District Court in Texas Finds Plaintiffs Lack Article III Standing in PHI Breach

    US District Court in Texas Finds Plaintiffs Lack Article III Standing in PHI Breach
    Beverly Peters v. St. Joseph Services Corporation d/b/a St. Joseph Health Care System was a class action that arose out of a data breach of the defendant-health care service provider. It was alleged in the action that malicious hackers…
  • Mar 5

    Gaps in Security The Increasing Need for Cyber Coverage

    Gaps in Security The Increasing Need for Cyber Coverage
    The following article was written by Brian Bassett and Guy Hollingsworth.  Brian is a Partner with Traub Lieberman Straus & Shrewsberry, LLP. Guy is a Claims Manager with AmTrust North America. Thanks guys! Rick We live in an…
Rank this Week: 3932

The Everlaw Blog

The Everlaw Blog

Covers legal technology used in litigation and eDiscovery, especially on the plaintiff's side.

http://blog.everlaw.com
  • Mar 27

    Why Ediscovery for Small Firm

    Why Ediscovery for Small Firm
    When talking with small firm lawyers and solo practitioners at Legaltech New York earlier this year, I couldn’t help but notice that many are skeptical of using ediscovery tools in their practices. Several solo practitioners so much so…
  • Mar 20

    Telling Your Story Chronologically

    Telling Your Story Chronologically
    Timing is everything. Lawyers know all too well that we present cases to juries in the form of chronological stories. I learned this on one of the first cases I worked on, where the chronology of when faxes were sent showing a…
  • Mar 13

    How Judicial Decisions Move the Ediscovery Industry Forward

    How Judicial Decisions Move the Ediscovery Industry Forward
    We’re all well aware of the ways in which rapidly-evolving technology is fueling change in legal evidence, including what’s considered relevant and how it’s reviewed. What’s slightly less obvious—but by no means…
Rank this Week: 3147

The Everlaw Blog

The Everlaw Blog

Comments on law, technology, and eDiscovery.

http://blog.everlaw.com/
  • Mar 27

    Why Ediscovery for Small Firm

    Why Ediscovery for Small Firm
    When talking with small firm lawyers and solo practitioners at Legaltech New York earlier this year, I couldn’t help but notice that many are skeptical of using ediscovery tools in their practices. Several solo practitioners so much so…
  • Mar 20

    Telling Your Story Chronologically

    Telling Your Story Chronologically
    Timing is everything. Lawyers know all too well that we present cases to juries in the form of chronological stories. I learned this on one of the first cases I worked on, where the chronology of when faxes were sent showing a…
  • Mar 13

    How Judicial Decisions Move the Ediscovery Industry Forward

    How Judicial Decisions Move the Ediscovery Industry Forward
    We’re all well aware of the ways in which rapidly-evolving technology is fueling change in legal evidence, including what’s considered relevant and how it’s reviewed. What’s slightly less obvious—but by no means…
Rank this Week: 3080

Privacy and Data Security Law

Privacy and Data Security Law

Covers the creation, collection, use, destruction and security of data. By Dentons.

http://www.privacyanddatasecuritylaw.com/
  • Mar 27

    Cyber Vulnerability in Wind Turbine

    Cyber Vulnerability in Wind Turbine
    It has been reported that a wind turbine which is deployed across the energy sector worldwide has been hacked.  Due to a software bug, an attacker can get the user name and password from the browser.  This can allow admin…
  • Mar 27

    ECJ case on Safe Harbor

    ECJ case on Safe Harbor
    The ECJ heard arguments, this week, in the action against the Irish Data Protection Commissioner that Safe Harbor should be declared invalid.  The case was originally brought by Austrian law student, Max Schrems. Let’s cut to the…
  • Mar 25

    Online Dating Site Hit with Anti-Spam Law Fine

    Online Dating Site Hit with Anti-Spam Law Fine
    On the heels of issuing its first Notice of Violation under Canada’s Anti-spam Legislation (CASL) earlier this month, the Canadian Radio-television and Telecommunications Commission (CRTC) announced today that Plentyoffish Media Inc.,…
Rank this Week: 2642

TelecomMediaTech Law Blog

TelecomMediaTech Law Blog

Covers telecommunications, media and technology law and policy. By Rini Coran, PC.

http://www.telecommediatechlaw.com
  • Mar 26

    FCC Hits TV Station With Maximum Fine for Fleeting Nudity in Newscast

    FCC Hits TV Station With Maximum Fine for Fleeting Nudity in Newscast
    The Federal Communications Commission has fined a television station $325,000 for allegedly broadcasting “extremely graphic and explicit sexual material”, i.e., indecent material.  The amount of the fine, underlying…
  • Feb 12

    Obituary: Rebecca Rini

    Obituary: Rebecca Rini
    Our colleague and friend Rebecca Rini passed away unexpectedly on Sunday, February 8, 2015.  Rebecca was the founding partner of the law firm of Rini, Coran & Lancellotta, PC and its successor, Rini O’Neil, PC.  She was an…
  • Jun 26

    Lessons from Aereo: Laws, Litigation and Loophole

    Lessons from Aereo: Laws, Litigation and Loophole
    In a case with far-reaching implications for the television business, for cloud computing and for new technologies, the U.S. Supreme Court found that Aereo’s online video service infringed copyrights held by television producers,…
Rank this Week: 4376

Anti-Generic Trademark

Anti-Generic Trademark

Covers strategic brand planning and foundation with commentary on trademark prosecution, trademark enforcement, making a brand famous, confronting online infringement and cybersquatting, and licensing a trademark. By Justin Clark.

http://www.antigenerictrademark.com
Rank this Week: 3382

Nextpoint's Legal Technology Blog

Nextpoint's Legal Technology Blog

Covers eDiscovery, social media archiving, and trial presentation solutions.

http://www.nextpoint.com/blog/
  • Mar 26

    Nextpoint Launches New Drag-and-Drop Litigation Data Import Tool

    Nextpoint Launches New Drag-and-Drop Litigation Data Import Tool
    Since 2001, Nextpoint has been relentless about simplifying litigation for legal teams. As the first-movers in cloud-computing technology built to manage the massive electronic data onslaught in litigation, we have had many a groundbreaking…
  • Mar 26

    Introducing Document Folders in Nextpoint Trial Preparation

    Introducing Document Folders in Nextpoint Trial Preparation
    Preparing for an upcoming trial, hearing or arbitration is serious and complicated business. You’ve got to collaborate with your team and manage a plethora of electronic documents, transcripts, pleadings, and other case files. At…
  • Mar 23

    Litigator’s Brief: 4 Critical Data Security Tips for Law Firm

    Litigator’s Brief: 4 Critical Data Security Tips for Law Firm
    Recently, I’ve been asking law firms to defend their decision to continue storing client and firm data on premise. The most common defense I hear from firms is that it’s risky to put it in the cloud, where it is…
Rank this Week: 3407

The Business Technology Law Blog

The Business Technology Law Blog

Covers legal issues impacting the technologies that businesses use to make money and grow. By Bradley Gross.

http://www.bradleygross.com/
  • Mar 25

    The Question Every Airline Needs to Answer: Why No Cockpit Video?

    The Question Every Airline Needs to Answer: Why No Cockpit Video?
    I'm going to take a moment from my usual legal technology-related posts to pose an obvious but unanswered question to the Federal Aviation Administration, as well as the airlines themselves: Why aren't commercial aircraft cockpits equipped…
  • Feb 5

    Left Shark Isn't As Scary As the Lawyers Protecting It

    Left Shark Isn't As Scary As the Lawyers Protecting It
    It's been reported that over a hundred million people watched Katy Perry's Super Bowl halftime show. If you're one of those people, then you likely saw the dancing sharks that accompanied her on stage.  I've heard lots of opinions about…
  • Feb 3

    It's In The Game...But Should EA Pay For It?

    It's In The Game...But Should EA Pay For It?
    Electronic Arts makes some of the most realistic sports video games on the market.  To do this, EA uses the likenesses of real players, and captures each player's unique physical appearance and signature moves.  EA’s games…
Rank this Week: 4225

Law, Technology & Arts Blog

Law, Technology & Arts Blog

Covers emerging legal issues in IP, technology, commerce, and the arts. From the Washington Journal of Law, Technology & Arts.

http://wjlta.wordpress.com/
  • Mar 25

    Blackphone 2 − The Panacea for Smartphone Confidentiality Concerns?

    Blackphone 2 − The Panacea for Smartphone Confidentiality Concerns?
    By Yayi Ding The use of smartphones has proliferated in the past couple of years. Not surprisingly, many of the users of such technology are lawyers! However, even given their immense benefits, the widespread use of smartphones in the…
  • Mar 11

    Lessons from the Silk Road

    Lessons from the Silk Road
    By Juliya Ziskina After a several weeks-long trial, a federal jury found Ross Ulbricht guilty of running and operating the online black market known as Silk Road on February 4, 2015. (We previously covered opening statements in the case…
  • Mar 6

    Has Spiderman’s monopoly of webs gone too far? – Supreme Court to hear Patent Antitrust case

    Has Spiderman’s monopoly of webs gone too far? – Supreme Court to hear Patent Antitrust case
    By Vijay Kumar Later this month, the Court will hear oral arguments for the patent licensing case Kimble v. Marvel Enterprises, Inc. to decide whether it should overrule Brulotte v. Thys Co. The 1964 Brulotte decision, which has since been…
Rank this Week: 4123

Court Technology and Trial…

Court Technology and Trial Presentation Blawg

Covers court and trial technology, and trial presentation. By Ted Brooks.

http://trial-technology.blogspot.com/
  • Mar 23

    Trial Tech Tips - Courtroom Equipment Specs for Large Venue

    Trial Tech Tips - Courtroom Equipment Specs for Large Venue
    If you were assembling a new trial presentation equipment set today, it wouldn’t be all that much different from what would have been done several years ago. Even with advances in video format and display technologies, it often comes to…
  • Mar 12

    Trial Tech Tips - Trial Presentation Shortcut

    Trial Tech Tips - Trial Presentation Shortcut
    Those of us who use computers frequently in our work use a handful of software programs on a regular basis. A few of the most common applications for Windows include Word, Excel and Outlook. Those are just a few of the tools we use most and…
  • Feb 8

    Trial Tips – The Friends and Family Plan

    Trial Tips – The Friends and Family Plan
    Dr. Laurie Kuslansky recently shared a few examples of how trusting friends and family members for litigation advice might be less than optimal (see No Advice is Better Than Bad Advice in Litigation). Although there are many good ways to save…
Rank this Week: 4037

Information Technology Law Blog

Information Technology Law Blog

Covers social media, e-discovery, privacy, and intellectual property. By Foster Swift Collins & Smith PC.

http://www.michiganitlaw.com/
  • Mar 23

    The Final Chapter on Aereo’s Chapter 11

    The Final Chapter on Aereo’s Chapter 11
    On June 25, 2014, the United States Supreme Court ruled that cloud-based television-streaming service, Aereo, violated U.S. copyright law and its subsequent Chapter 11 bankruptcy filing has come to a dramatic conclusion. We have followed this…
  • Mar 16

    Chilling Effect or Creative Boundaries? Full Impact of “Blurred Lines” Ruling Still Hazy

    Chilling Effect or Creative Boundaries? Full Impact of “Blurred Lines” Ruling Still Hazy
    A decision in a copyright infringement case concerning the song “Blurred Lines” casts ambiguity on the future of expression and copyright protection in the music industry. On Tuesday, March 10, an eight-person jury in Los Angeles…
  • Feb 26

    File Tax Returns Early: IRS Releases Information on Tax-related Identity Fraud

    File Tax Returns Early: IRS Releases Information on Tax-related Identity Fraud
    Have your filed your individual tax return? Be sure to read the blog post, "One Reason You May Want to File Your Tax Return Early this Year: Identity Theft," on Foster Swift's Tax Law Blog and file early this year. Tags: News &…
Rank this Week: 3642

Droit et Nouvelles Technologies

Droit et Nouvelles Technologies

Swiss blog about law and information technologies.

http://ntdroit.wordpress.com/
Rank this Week: 4252

Watching the Connectives

Watching the Connectives

Covers telecoms and technology. By Olswang.

http://robbratby.com/
  • Mar 23

    ISO 27018 – the international standard for protecting PII in the public cloud – Where are we now?

    ISO 27018 – the international standard for protecting PII in the public cloud – Where are we now?
    Since its release in August 2014, ISO 27018 is becoming well established as the “go to” standard to help cloud customers to comply with their privacy obligations when using public cloud services.  Privacy regulators recognise…
  • Mar 19

    Myanmar mobile banking and payment: where to start?

    Myanmar mobile banking and payment: where to start?
    Myanmar is currently largely a cash economy.  In this post we consider the types of mobile banking and payments solutions we predict will first gain traction in the Myanmar market: remittance services and banking the unbanked. Outside…
  • Jan 26

    UK withdraws proposed updates to the Electronic Communications Code

    UK withdraws proposed updates to the Electronic Communications Code
    On 22 January 2015, the UK Government withdrew its proposed changes to the Electronic Communications Code. As the changes were unexpected, more time for consultation is not entirely unwelcome. However, as the changes in large part were…
Rank this Week: 4090

High Tech Policy Blog

High Tech Policy Blog

From Cisco Systems.

http://blogs.cisco.com/gov
  • Mar 22

    An Internet that spurs not strangles innovation

    An Internet that spurs not strangles innovation
    The world we live in today is one where people, process, data and – increasingly – things are connected as never before. The Internet of EveryThing (IoE), is driving the most dynamic area of innovation, creating new business…
  • Feb 27

    Cisco Supports LEADS Act

    Cisco Supports LEADS Act
    The world’s economy is increasingly interconnected. Continued economic growth stems from companies being able to move data freely across borders without being caught between conflicting legal requirements.  Governments also…
  • Feb 26

    Cisco Statement on FCC Decision to Regulate the Internet

    Cisco Statement on FCC Decision to Regulate the Internet
    “When the FCC Chairman’s office originally unveiled open Internet rules last year, Cisco cheered the proposal, because we support an open Internet and believe that balanced rules that protect consumers and prevent anti-competitive…
Rank this Week: 2466

Virtual Law Practice

Virtual Law Practice

Discusses practicing law in a web-based virtual law office (vlo). By Stephanie Kimbro.

http://virtuallawpractice.org
  • Mar 22

    Gamification in Law Firm

    Gamification in Law Firm
    Here is my draft working paper on Gamification in Law Firms which looks at the use of gamification in law firms to increase productivity and collaboration, among other benefits. This paper provides a framework for approaching…
  • Mar 9

    Virtual Law Practice: Second Edition Released

    Virtual Law Practice: Second Edition Released
    The second edition of my book, Virtual Law Practice, will be released from ABA LPD Publishing this month. (There will be a digital copy for sale in the coming months and eventually it gets released on Amazon for those of you who want other…
  • Dec 16

    Practicing Law Online Ebook

    Practicing Law Online Ebook
    Here is the revised version of the Practicing Law Online ebook, which I first released in 2008 and updated in 2010. This revised edition of the ebook examines different business models for virtual law firms and goes…
Rank this Week: 4893

AlphaTech Counsel

AlphaTech Counsel

Covers legal and business issues for entrepreneurs and emerging companies.

http://alphatechcounsel.com/blog
  • Mar 19

    Determining the Size of the Stock Option Pool

    Determining the Size of the Stock Option Pool
    In this AlphaTakes video, Meechie Pietruczak discusses calculating the number of shares in an emerging technology company’s option pool. Here are the key takeaways from this video: Emerging technology companies usually create stock…
  • Mar 19

    Determining the Size of Your Stock Option Pool

    Determining the Size of Your Stock Option Pool
    In this AlphaTakes video, Meechie Pietruczak discusses calculating the number of shares in an emerging technology company’s option pool. This process can be overlooked by entrepreneurs but it is important to know, particularly when…
  • Mar 9

    AlphaTakes – Series A Preferred Stock Term Sheet (part two)

    AlphaTakes – Series A Preferred Stock Term Sheet (part two)
    In this second of a two part AlphaTakes video series, Matt Storms discusses the second half of the Series A Preferred Stock term sheet for an emerging technology company, using the Series A term sheet published by the National Venture Capital…
Rank this Week: 3859

Joshua Slayen

Joshua Slayen

Covers law, technology and social media for the Huffington Post.

http://www.huffingtonpost.com/joshua-slayen/
  • Mar 16

    How to Have a Good Relationship With Your Lawyer

    How to Have a Good Relationship With Your Lawyer
    Most people will need a lawyer at one point in their lives. Whether it is a home purchase or a will, a bankruptcy or a divorce, lawyers are a necessary part of our society. There are many different layers of client service within that…
  • Feb 10

    Is Marriage the New Dating? How Wills and Estates Lawyering Must Adapt in the 21st Century

    Is Marriage the New Dating? How Wills and Estates Lawyering Must Adapt in the 21st Century
    When it comes to wills/estates planning, as mentioned, the state of one's intimate relationship(s) becomes critical. Although I promised not to bore you with all of the nuances, I'm going to temporarily break that promise to name a few facts…
  • Nov 26

    What You Need to Know About Common-Law

    What You Need to Know About Common-Law
    How do you enter into a common-law relationships in the first place and when do various rights vest? For those of you living with a partner or considering doing so (or if you have adult children considering same), I suggest that you grab a…
Rank this Week: 3169

WITNESSETH: Law, Deals & Data

WITNESSETH: Law, Deals & Data

Provides practical insights from quantitative legal research on corporate law, capital markets, finance, and mergers & acquisitions, as well as law schools and legal education. By Professor Robert Anderson.

http://witnesseth.typepad.com
  • Mar 13

    Law Students and Recent Alumni: Please Take this Two Question Survey

    Law Students and Recent Alumni: Please Take this Two Question Survey
    This short survey is part of an ongoing effort to develop a law school curriculum that better serves the needs of students. If the best answer is not listed, please click on "Other" and enter a response.
  • Feb 16

    Apparently now is the time when I'm supposed to do my taxe

    Apparently now is the time when I'm supposed to do my taxe
    Apparently now is the time when I'm supposed to do my taxes. I always do mine on October 15, the very last day before the automatic extension expires, but the Google Trends chart below for "turbotax" searches suggests most people…
  • Feb 12

    New SEC Guidance on Abbreviated Debt Tender Offers Published

    New SEC Guidance on Abbreviated Debt Tender Offers Published
    The SEC has published a new set of guidelines for debt tender offers. The guidelines revise a set of no-action letters that have been issued over the years allowing issuers to complete debt tender offers without keeping them open for 20…
Rank this Week: 3120

Dot Indicia

Dot Indicia

Covers information, privacy and security from a Canadian perspective. By Michael Power.

http://michaelpower.ca
  • Mar 3

    The Law of Cybersecurity & In-House Counsel

    The Law of Cybersecurity & In-House Counsel
    Last month saw an interesting study emerge from the Maurer School of Law at Indiana University. It discusses the current and potential role of lawyers in the area of cybersecurity and the emerging, but still nascent, field of…
  • Feb 8

    The Canadian Privacy Cases of 2014

    The Canadian Privacy Cases of 2014
    As we move more into 2015, I thought I’d put together my own list of the more interesting Canadian privacy cases of 2014. These are judicial decisions so there’s no Commissioner findings or orders here. Some of these…
  • Jan 27

    Revenge Porn & Canadian Law

    Revenge Porn & Canadian Law
    Whenever a new technology arrives, society always plays “catch up” to determine what norms to apply to the use of that technology. It’s probably how we got traffic lights after the advent of automobiles.  One…
Rank this Week: 3612

Free as in Freedom

Free as in Freedom

Discusses legal and policy issues in the software freedom community, with occasional interviews. By Bradley M. Kuhn and Karen Sandler.

http://faif.us/
  • Mar 3

    0x55: Nick Coghlan at LCA 2015

    0x55: Nick Coghlan at LCA 2015
    Show Notes Segment 0 (00:00:35) Bradley and Karen interviewed Nick Coghlan who works for Red Hat and contributes to various Open Source and Free Software projects such as Python. Nick discussed his work on the infrastructure…
  • Jan 29

    0x54: Carol Smith at LCA 2015

    0x54: Carol Smith at LCA 2015
    Show Notes Segment 0 (00:00:35) Bradley encourages those who attend FOSDEM 2015 to attend sign up to attend the Supporter Night Event on 30 January 2015 in Brussels, Belgium. Segment 1 (00:50:11) More Show notes for this one…
  • Dec 30

    0x53: Can Plagiarism Happen Under Copyleft?

    0x53: Can Plagiarism Happen Under Copyleft?
    Show Notes Segment 0 (00:00:37) Please donate to to send Dan to a conference. There's a progress bar on faif.us now. You can also donate to support Software Freedom Conservancy, where Bradley and Karen work, by becoming…
Rank this Week: 4354

Center for Democracy & Technology…

Center for Democracy & Technology Blog

Cover privacy, digital copyright, security and open government.

https://cdt.org/blog/
Rank this Week: 2930

eMedia Law insider

eMedia Law insider

Covers internet marketing and online media. By Looper Reeed.

http://www.emedialaw.com/
  • Feb 26

    Will Net Neutrality Kill the Internet 3.0?

    Will Net Neutrality Kill the Internet 3.0?
    As expected, the FCC passed the net neutrality rules today.  Other than spokesmen for the large telecoms (and perhaps some politicians who listen to that lobby), you don’t hear much reasoned opposition to net neutrality. I have to…
  • Feb 11

    GUEST POST: Left Shark, Katy Perry and 3D Printing – Someone is getting bit

    GUEST POST: Left Shark, Katy Perry and 3D Printing – Someone is getting bit
    Today, we have a guest post from Gray Reed & McGraw attorney Cleve Clinton (the one on the far left).  He is one of the writers of the enlightening and entertaining blog over at Tilting the Scales where they share common sense,…
  • Jan 14

    Getting Pictures Off the Internet – Not Easy To Do

    Getting Pictures Off the Internet – Not Easy To Do
    I love college basketball.  Given that my Missouri Tigers haven’t given me much to talk about, I thought we could discuss the efforts by this upset Duke fan to have her image removed from the Internet captured during the Miami…
Rank this Week: 4440

Cyberleagle

Cyberleagle

Graham Smith's blog on law, IT, the Internet and new media

http://cyberleagle.blogspot.com/
  • Feb 22

    From telegram to tweet: Section 127 and all that

    From telegram to tweet: Section 127 and all that
    Big Brother Watch has this week published the results of its research, conducted via freedom of information requests to police forces, into prosecutions and convictions under two communications offences: Section 127 of the Communications Act…
  • Feb 2

    IP address resolution - a conundrum still unresolved?

    IP address resolution - a conundrum still unresolved?
    Am I the only one still confused by Clause 17 (now Clause 21) of the Counter-Terrorism and Security Bill?  This is the clause that will extend the communications data retention provisions of DRIPA to cover so-called IP address…
  • Jan 25

    Latest score in the jurisdiction game: Internet 0, EU Court of Justice 2

    Latest score in the jurisdiction game: Internet 0, EU Court of Justice 2
    The CJEU in Pez Hejduk (22 January 2015) has plumped for mere accessibility as the threshold for online copyright jurisdiction under Article 5(3) of the EU Jurisdiction Regulation.Mere accessibility is problematic for the internet.…
Rank this Week: 3456

Apple Briefs

Apple Briefs

Covers using Macintosh computers and software in a law practice. By Jeffrey Kabbe.

http://www.applebriefs.com/
  • Feb 18

    What a long, strange trip it’s been

    What a long, strange trip it’s been
    It’s hard to believe that it has been three years since I last updated Apple Briefs. In the past three years we have moved to a larger office, grown our staff to six team members, and served hundreds of great families. Over that time,…
  • Jan 19

    Getting published just got a whole lot easier

    Getting published just got a whole lot easier
    Apple has released quite a few products in the past couple of years. I am loving Final Cut Pro X. And some of the iPhone upgrades have been tremendous. But I don’t think I have been quite as excited about a new product since the iPad was…
  • Oct 9

    Steve’s Legacy Redux

    Steve’s Legacy Redux
    I have learned a few things in the days since Steve Jobs passed.  First, I really wish I could write like John Gruber, Walter Isaccson, and others. Second, I have learned just how many people had strong feelings for Steve’s contribution to…
Rank this Week: 4127