Legal news and analysis for IT professionals, including antitrust lawsuits, and patent and trademark disputes
  • Legal risks of on-demand computing

    Posted May 16, 2003 - 4:01 pm

    On-demand computing differs from traditional outsourcing in at least one important respect: the very nature of on-demand means that there are unknowns.
  • Businesses fail to meet SEC rules on e-mail archiving, risk fines, imprisonment

    Posted May 15, 2003 - 9:29 pm

    The SEC has imposed strict rules on e-mail that some types of businesses must archive - but many affected organizations don't know about or fully understand their legal obligations. Read on to find out more, so you don't have to find out the hard way.
  • Database security in high-risk environments

    Posted May 13, 2003 - 2:26 am

    Database security is especially important when the stakes are high. Find out what the best practices are when you have data that simply cannot be allowed to become public, particularly in light of recent privacy legislation.
  • Reporter's Notebook: At CFP, little things add up

    Posted April 23, 2003 - 3:06 pm

    While checking into the New Yorker hotel for the annual conference on Computers, Freedom and Privacy (CFP) in New York last week, the man at the front desk took my driver's license and made a copy.
  • Legal eagles introduce evidence of security policies' worth

    Posted April 21, 2003 - 1:36 am

    According to a recent presentation at the RSA conference, a security policy isn't merely a technical document: it's a legal one as well, and it can show a judge in a legal proceeding that your company did its part to maintain a secure environment. Find out why your security policy may be crucial if your company ever finds itself in court.
  • Guide to online privacy

    Posted April 17, 2003 - 7:49 pm

    The Center for Democracy and Technology, a nonprofit group that studies the intersection of technology and society and advocates various causes, has put together this primer on the online privacy issue. It includes historical background and a review of pertinent legislation.
  • The feds may enforce your privacy policy

    Posted April 17, 2003 - 7:15 pm

    The FTC is taking a more aggresive stand towards private companies' privacy policies: if those companies fail to enforce their own policies, the federal government will intervene. This note from a technology lawyer gives you the scoop on the new environment.
  • Privacy experts see more lawsuits involving mishandled hard drives

    Posted April 7, 2003 - 3:30 pm

    Experts say the best way to remove information from a hard drive is to overwrite the data multiple times. Others say destroying the drive is the only way to be sure. Be advised that the lack of proper erasure may leave personal information accessible and increase a company's liability risk for mishandling personal information.
  • U.S. information security law

    Posted April 4, 2003 - 5:23 pm

    This article provides information on the legal framework in place for the protection of information and information systems. It explores the Computer Fraud and Abuse Act, the Digital Millennium Copyright Act, state laws and the like. It also speaks to what infosec professionals can bring to bear to improve the security of the people and businesses who depend on them.
  • Gramm-Leach-Bliley Act FAQ

    Posted April 2, 2003 - 7:48 pm

    The Gramm-Leach-Bliley Act is a federal law that applies to financial services insitutions in every state. This brief Q and A covers some of the frequently asked questions. These questions will help shape your dialog with potential software and hardware vendors if your shop is covered by the act.
  • Privacy research: Gramm-Leach-Bliley Act

    Posted April 2, 2003 - 7:34 pm

    This Web site is dedicated to providing reliable, convenient and understandable regulatory compliance information and solutions to the financial services industry. You'll find detailed information on the Gramm-Leach-Bliley Act, frequently asked questions, and other goodies.
  • Cybersecurity plan heavy on private-public cooperation

    Posted March 30, 2003 - 4:28 pm

    A recent government report proposed a future for network security that consisted of heavy public-private cooperation. The report shies away from strict regulation by the federal government. Will it stand up to scrutiny, or is this the best approach?
  • Security and the law: Working with law enforcement in response to attacks

    Posted March 30, 2003 - 4:14 pm

    If someone's broken into your network, your legal steps don't end when you call the police to report the crime. Because computer crime is still an embryonic field, you'll have to take an active role in the investigation, coordinating between different law enforcement agencies and educating potentially unschooled police officers on the nature of the crime. Find out what you'll need to know to bring a case to a successful conclusion.
  • Legal action against Microsoft over slammer seen falling short

    Posted March 30, 2003 - 4:09 pm

    In the wake of the devastating SQL Slammer worm, a South Korean public interest group is considering suing Microsoft for negligence under South Korean product liability law, claiming Redmond knew about the vulnerability and didn't take adequate steps to prevent disaster. While this might send a chill through IT companies everywhere, legal experts predict that the case will not find smooth sailing in the U.S.
  • Privacy law experts for hire

    Posted March 28, 2003 - 3:17 pm

    So many new privacy laws and regulations have been passed in recent years that a new kind of specialist has emerged: the computer privacy consultant. Find out if such a professional will help you make sense of your legal obligations - or if you're better off figuring it out on your own.
  • Instant messaging and HIPAA

    Posted March 28, 2003 - 2:32 pm

    Health Insurance Portability and Accountability Act (HIPAA), which begins to take effect in April 2003, establishes stringent new rules on what communication by health care pros gets captured and stored. But since the law was passed in 1996, instant messaging (IM) has come into its own as a popular means of intra-organization discussion. Find out what your responsibilities are if your users chat via IM.
  • Electronic transactions and code sets compliance checklist

    Posted March 28, 2003 - 2:27 pm

    The HIPAA Education Coordinating Committee prepared this high-level checklist for complying with the electronic transactions and code sets. Covered healthcare entities who submitted an extension form for electronic transaction and code sets are required to begin testing no later than April 16, 2003.
  • Getting ready for HIPAA

    Posted March 28, 2003 - 2:23 pm

    If you're in the healthcare field, and you electronically transmit health information, this guide should be part of your HIPAA resources. The Massachusetts Medical Society's Department of Health Policy/Health Systems and the Office of the General Counsel have developed this white paper to educate you on the basic elements for compliance with privacy regulations. This guidebook includes checklists to assess and begin your HIPAA compliance efforts, pointers for drafting your HIPAA documents, and model language, forms and resources for implementing HIPAA.
  • HIPAA is around the corner: April 14 deadline

    Posted March 28, 2003 - 2:18 pm

    On April 14th, 2003, HIPAA regulations go into affect. What does that mean for IT staffs? HIPAA requirements are complex and require plenty of time to plan. This overview provides an introduction to the basic compliance requirements, and a checklist of simple privacy steps to take now.
  • Online privacy

    Posted October 17, 2001 - 4:18 pm

    --Scott McNeely, CEO, Sun Microsystems

  • Checking out your shopping cart

    Posted July 12, 2001 - 3:53 pm

    Attention shoppers: There's a new aisle open in the privacy debate. Supermarkets are cheering a new way to discourage "basket splitters" -- pesky shoppers who don't put all their food purchases in one store's basket -- while privacy advocates are booing about Big Brother watching what you eat.
  • Kmart shines its Blue Light on solid state disks

    Posted May 11, 2001 - 5:30 pm

    When Kmart relaunched its Blue Light Special this year, the company needed a high-speed storage technology to handle the load of its outbound e-mail and targeted mailing to customers.
  • Earlier Patent Could Potentially Play Role in Amazon Dispute

    Posted May 11, 2001 - 2:57 pm

    A Web site that lets companies offer cash bounties for information related to patent disputes said it has found so-called prior art that could have a bearing on a lawsuit between and
  • Bush Administration Seeks IT Budget Boost

    Posted May 11, 2001 - 2:48 pm

    The State Department is seeking $273 million to upgrade its IT systems, as the Bush administration prepares to push for cross-agency projects.
  • Researchers struggle with problems from hiding data

    Posted May 9, 2001 - 2:42 pm

    A new form of Cryptography involves hiding information inside another digital medium so that others don't even know it's there.
Join us:






Join today!

See more content
Ask a Question