Legal news and analysis for IT professionals, including antitrust lawsuits, and patent and trademark disputes
  • Is vigilante hacking legal?

    Posted September 22, 2003 - 11:42 pm

    Many of those who counsel against strikeback hacking - launching attacks against attacking computers - state that the practice opens the cybervigilante up to potential legal prosecution. But some security experts argue that taking actions against poorly secured machines that have been compromised and used as a platform for attacks may be legal under nuisance laws.
  • Have I got a deal for you! Cutting through vendor hype

    Posted September 16, 2003 - 1:58 pm

    Vendors will play on your fear of regulatory actions to oversell their products. This article will help you cut through the hype and choose the vendor that will keep your company on the straight and narrow.
  • Security: Can you afford not to outsource it?

    Posted September 16, 2003 - 1:52 pm

    The demands of regulators have prompted many IT pros to outsource their IT security. But how to pick a vendor? This article offers some tips from the field.
  • Why managed security services are so popular in financial institutions

    Posted September 16, 2003 - 1:41 pm

    Regulations actually drive many financial institutions to outsource their security. Find out how vendors can help such institutions meet their regulatory burden.
  • Due diligence gets its due

    Posted September 16, 2003 - 1:32 pm

    With increased security regulations in the financial services world, a host of outsourcing firms have sprung up promising to manage the regulatory complexity for financial institutions. But as this article explains, such institutions need to find out all they can about outsourcing firms before they sign on the bottom line.
  • Sarbanes-Oxley: Non-compliance could mean jail time, so choose your vendors wisely

    Posted September 16, 2003 - 1:28 pm

    CFOs who fail to raise corporate accounting standards to the level required by the Sarbanes-Oxley act may face jail time - and thus many are looking to software vendors for a quick fix. This article outlines some more level-headed guidelines that will help you meet the needs of this law and any other regulation that may impose change upon your IT department.
  • Data storage for managing the health enterprise and achieving business continuity

    Posted August 28, 2003 - 1:48 pm

    Journal of Healthcare Information Management reprint addresses storage management for healthcare organizations, including tape and disk management, and disaster avoidance and recovery. (.pdf)
  • Porn a greater corporate worry than music downloads

    Posted August 18, 2003 - 11:28 pm

    While music MP3s are the first thing most people associate with illegal file trading, pornographic images and movies are also common on P2P file trading networks - and their presence on your company's computer can open you up to a world of legal problems. Read on to find out more.
  • Internet sparks a copyright fire: A short history of copyright in the digital age

    Posted August 18, 2003 - 11:21 pm

    Confused by the ins and outs of the digital copyright saga? This short history will bring you up to speed.
  • P2P file exchange: The law's not on your side

    Posted August 18, 2003 - 11:14 pm

    When speaking about P2P file swapping of copyrighted materials, a U.S. Justice Dept. official said, "A lot of people think these activities are legal, and they think they ought to be legal." But they aren't legal, and prosecutions are in the offing for those who make the mistake of thinking they are. Read on to find out how to keep your company out of the fray.
  • Penn State cuts off P2P file traders

    Posted August 18, 2003 - 11:10 pm

    Universities were among the first large organizations that needed to deal with the legal fallout of illegal file trading. Read on to find out how one university dealt with the situation - and if the lessons apply to your organization.
  • Tech firm nailed for internal MP3 sharing

    Posted August 18, 2003 - 11:03 pm

    With the RIAA putting legal muscle behind its anti-file-sharing crusade, companies need to watch their step. Last year, a tech company was forced to settle with the recording industry group over a server that shared MP3s internally.
  • Corporate P2P use is common, study says

    Posted August 18, 2003 - 10:59 pm

    Despite the recording industry's increasingly litigious crackdown, file-swapping software is still deeply entrenched in corporate networks: over 77 percent of surveyed companies had at least one instance of Kazaa or Morpheus on their systems, according to a recent report.
  • Provident Bank mines check images for Gold

    Posted August 9, 2003 - 5:36 pm

    Provident is using MindReader, from Orbograph, for its check imaging project. The goal goes beyond cutting costs
  • E-mail and IM compliance

    Posted August 9, 2003 - 4:38 pm

    LiveOffice Corp. has announced that its AdvisorMail has been integrated with its proprietary message monitoring and storage system. The new feature meets NASD guidelines for instant messaging control and record-keeping.
  • Security spotlight shines on SANs

    Posted August 8, 2003 - 7:22 pm

    Federal regulatory requirements and the proliferation of networked storage has forced new emphasis on the relative security of data on a peer-to-peer network. Keeping in mind traditional networking security and implementation you can achieve SAN security.
  • CERT, Feds consider new reporting process

    Posted August 1, 2003 - 1:03 am

    The wide reach of the Internet means that secrets are very difficult to keep. Earlier this year, the anonymous revelation of several vulnerabilities in mailing list forced the U.S. government and the CERT Coordination Center to reconsider their position on disclosing security holes.
  • Clearinghouse for 21 CFR Part 11

    Posted June 26, 2003 - 9:36 pm

    This web site provides access to information on Title 21 Code of Federal Regulations Part 11 (CFR Part 11 for short). Find the latest conference, meeting and seminar information as well as links to vendors and consultants who can help the pharmaceutical community with issues of compliance with regulations and productivity.
  • HIPAA: The storage labyrinth

    Posted June 26, 2003 - 4:59 pm

    The good intentions that drive legislation such as HIPPA often leave the storage guy stuck in the middle, with limited options. At the end of the day, he may also be the fall guy when things go wrong.
  • Of 'zombie' computers and DDoS attacks: The security liability

    Posted June 24, 2003 - 3:04 am

    You can be held legally liable for what your machines do - even if they are obeying a hacker and not you. Read on to find out why you need to care about outgoing packets as much incoming packets.
  • HIPAA security requirements: Plans prepare to comply

    Posted June 8, 2003 - 6:04 pm

    If you haven't gotten going on HIPAA compliance, you're in for a long couple of years. Nice overview feature gives some examples of insurers who have begun to implement their own compliance plans, as well as some advice as to where to start and what functionality and data needs to be compliant.
  • Be ready for HIPAA requirements

    Posted June 8, 2003 - 5:20 pm

    The CEO of StorageTek talks about the companies products and strategies designed for the life sciences market in this interview.
  • Accounting rules: You must keep e-mails

    Posted June 8, 2003 - 3:19 pm

    A nice overview of what the Sarbanes-Oxley Act is and what you need to do to comply with it's reporting and retention requirements.
  • Managing software licenses in a U.C. world

    Posted May 20, 2003 - 3:01 pm

    As if the myriad of software licensing options weren't already confusing enough, the "on-demand" model of utility computing adds another layer of complexity. But when you're paying for what you use, it's critical to your bottom line to manage software licences very tightly.
  • New insurance products for the hosting industry

    Posted May 18, 2003 - 6:21 pm

    Beyond SLAs, firewalls, and virus protection, learn what steps your organization needs to take to mitigate risk in this age of hosting.
Join us:






Join today!

See more content
Ask a Question