Legal news and analysis for IT professionals, including antitrust lawsuits, and patent and trademark disputes
  • How to respond to a data breach

    Posted April 2, 2014 - 2:18 pm

    GAO: Data breaches have more than doubled since 2009, how should government, companies respond?
  • How BYOD puts everyone at legal risk

    Posted November 21, 2013 - 2:20 pm

    If your BYOD policy goes too far you may be prosecuted for unfair labor practices.
  • Real names, real problems: Pseudonymity under siege

    Posted September 17, 2013 - 6:00 am

    As online services incorporate facial recognition and other biometric technologies to identify users, the notion of participating online using a name not found on your government-issued ID may become a quaint relic of the early Internet.
  • The thief in the 3D printing world may not be who you think

    Posted July 19, 2013 - 12:39 pm

    Discussions about copyright or patent infringement related to 3D printing often revolve around the idea of individuals stealing designs from corporations. In recent events, it was the reverse, highlighting just how much confusion there is around rights in 3D printing.
  • Uncle Sam shares blame for Chinese espionage

    Posted May 10, 2013 - 6:16 pm

    Cyber espionage from China is at the top of the U.S.'s grievance list. But Pentagon brass and official Washington dithered for more than a decade while attacks mounted.
  • 13 IT security myths debunked

    Posted February 19, 2013 - 2:47 pm

    Security pros share their favorite security tall tales.
  • The Pirate Bay's Peter Sunde: 'They can't take my soul'

    Posted February 19, 2013 - 1:02 am

    Peter Sunde was the poster boy for the file sharing movement, then he was sentenced to eight months prison and fined millions of dollars
  • Mobile attacks top the list of 2013 security threats

    Posted January 9, 2013 - 12:50 pm

    For years, information security experts have predicted a spike in mobile malware. Will 2013 be the year of mobile attacks? And what other security threats are on the horizon?
  • Patent cases color mobile market, to continue in 2013

    Posted December 21, 2012 - 12:08 pm

    Over the past year, patent battles have been fought by tech companies in courtrooms all over the world. The litigation is far from over though, however, and will continue throughout 2013. This is what's at stake on the patent battlefield in the near future.
  • 2012: The year in quotes

    Posted December 12, 2012 - 9:45 am

    Some of the most memorable IT-related quotes were uttered in courtrooms this year, which involved a steady stream of legal challenges about intellectual property. In no particular order, these are some of the comments that stuck with us as 2012 winds to a close.
  • The scariest software project horror stories of 2012

    Posted December 10, 2012 - 5:36 pm

    Sure, plenty of enterprise software projects go just fine and end up giving customers all the things vendors promise: lower operating costs, streamlined operations and happier users.
  • From Julia Child to mobile devices: How one group cooks up accessible media technology

    Posted October 17, 2012 - 1:31 pm

    The National Center for Accessible Media helps develop tools, standards and policies so people with disabilities can access new technology and content
  • Corporate cloud showdown: IT vs. Legal

    Posted June 13, 2012 - 10:56 am

    Increasingly, IT and legal find themselves facing off over the benefits and risks of cloud computing. Here's how some entities have hammered out a compromise.
  • Hard time: 10 tech CEOs sent to the slammer

    Posted May 13, 2012 - 8:00 am

    A sampling of famous and not-so-famous tech execs who ran afoul of the law
  • World's most dangerous hackers want to steal how you make money

    Posted April 26, 2012 - 7:47 am

    Black hat hackers that penetrate your organization and steal sensitive information like customers' credit card data are a serious threat. But nation-state-sponsored hackers after the intellectual property that makes your business competitive could be an even larger threat.
  • Why tech vendors fund patent 'trolls'

    Posted April 5, 2012 - 9:30 am

    Some of the largest names in the tech industry are funding patent 'trolls,' for protection from lawsuits and for access to the patent pool.
  • How to protect your intellectual property in the cloud

    Posted February 6, 2012 - 4:39 pm

    IT professionals know that handing data over to a third-party is always risky, but cloud computing creates unique concerns for IP. Here are nine tips to protect critical corporate data wherever it goes
  • This week in pictures: Symantec's no good, rotten, very bad week

    Posted January 27, 2012 - 5:32 pm

    Also: RIM's co-CEOs resign, the MegaUpload maelstrom swirls, Mark Shuttleworth teases HUD, Chris Dodd wags a finger at SOPA's flip flopping politicians, and jailbreakers unite!
  • Are you at risk? What cybercriminals do with your personal data

    Posted January 26, 2012 - 2:49 pm

    When hackers attack a company's systems and steal your personal data, what risk does that pose to you and other victims? How much is your name and email address worth to cybercriminals anyway? Here's what's really at stake.
  • FAQ: SOPA and PIPA

    Posted January 18, 2012 - 10:31 am

    The Stop Online Piracy Act (SOPA) and Protect IP Act (PIPA) have been making headlines, but what are they, exactly? Here are the facts.
  • 5 hot technology policy agenda items you need to watch

    Posted January 6, 2012 - 8:55 am

    From providing more spectrum space for wireless providers to battling online piracy to creating cybersecurity policy to protecting intellectual property, expect things to heat up in Washington this year. So pour yourself a cup of coffee and read on to learn how lawmakers will impact the tech world in the year ahead. .
  • 10 biggest ERP software failures of 2011

    Posted December 20, 2011 - 10:43 am

    With the year drawing to a close, one thing seems abundantly clear: There are still an awful lot of ERP and other software projects running off the rails out there.
  • How Shell gets 11 vendors to play nicely together

    Posted November 30, 2011 - 1:45 pm

    How Shell gets 11 vendors to play nicely together
  • Down and out in EULA-ville

    Posted November 17, 2011 - 11:59 am

    End user license agreements are extremely long, terribly hard to grasp, and written to cover so many aspects of every single way you might use this thing you're just starting to use that it's both humorous and pointless in its incomprehensibility. But they can get you in a mess of trouble. Is there any way out of this foggy morass?
  • On the front line against the next Stuxnet

    Posted October 1, 2011 - 11:28 pm

    Meet the people who will get the call when the next Stuxnet worm strikes.
Join us:






Spotlight on ...
Online Training

    Upgrade your skills and earn higher pay

    Readers to share their best tips for maximizing training dollars and getting the most out self-directed learning. Here’s what they said.


    Learn more

Join today!

See more content
Ask a Question