Legal news and analysis for IT professionals, including antitrust lawsuits, and patent and trademark disputes
  • Linux at 20: New challenges, new opportunities

    Posted August 29, 2011 - 6:14 am

    The rise of cloud computing and mobility could elevate the open source OS to a level of unprecedented dominance
  • 5 legal gotchas in the cloud

    Posted August 10, 2011 - 3:30 pm

    Don't sign a cloud computing contract until you consider five areas that are fraught with risk in the cloud. The red flags include not only data security and privacy, but also e-discovery, search warrants and jurisdictional issues.
  • Is retaliation the answer to cyber attacks?

    Posted January 21, 2011 - 8:54 am

    Should revenge assaults be just another security tool large IT shops use to counter cyber attacks?
  • Top 10 stories of 2010: Living in the post-PC world

    Posted December 7, 2010 - 10:32 am

    The top stories of 2010 show that the PC for many people around the world has already become just one of several devices used to tap the Internet and a world of applications for entertainment and business -- and that increasingly, the main Internet access device is not a PC.
  • Security laws, regulations and guidelines directory

    Posted November 3, 2010 - 1:16 pm

    This directory includes laws, regulations and industry guidelines with significant security and privacy impact and requirements. Each entry includes a link to the full text of the law or reg as well as information about what and who is covered.
  • The Intimate Social Graph

    Posted October 14, 2010 - 11:02 am

    The privacy of the intimate social graph rests on the vagaries of localized judicial interpretations of a creaky 24-year-old law.
  • How to keep employees from stealing intellectual property

    Posted September 27, 2010 - 10:45 am

    Your data is your business. And if you're not vigilant about your employees' access to that data, you're going to end up out of business. That's the advice of Patricia Titus, current CISO of Unisys and former CISO of the Transportation Security Administration.
  • Java developers' reaction to Oracle, Google lawsuit

    Posted August 27, 2010 - 3:14 pm

    What do the programmers and companies that depend on the Java software family make of Oracle suing Google? To find out, we asked them.
  • The recent history of governments vs. the Internet

    Posted August 18, 2010 - 8:00 am

    RIM-UAE dust up only the latest example of countries fighting access
  • Strategy's Limits: A chat with Ernest von Simson

    Posted July 30, 2010 - 2:15 pm

    As co-founder of The Research Board, an exclusive, IT-focused think tank established in 1970, Ernest von Simson watched time and again as corporate leaders took their companies through change and crises over three decades. During those years, he came to believe that steadfastness is the most vital leadership characteristic for success, as he demonstrates in his new book, "The Limits of Strategy: Lessons in Leadership from the Computer Industry".
  • IT pros: Lurking legal gotchas and how to avoid them

    Posted July 19, 2010 - 10:34 am

    Ignorance and seemingly innocent activities can subject you to fines, lawsuits, and even jail. Here's how to play it safe.
  • What the mobile patent fight is all about

    Posted May 13, 2010 - 10:38 am

    Apple, others are at war over who owns the key technologies such as multitouch in the burgeoning mobile market.
  • Facebook's most wanted

    Posted March 12, 2010 - 1:34 pm

    Social networking has a dark and hilarious side of ill-conceived criminality. Here are some of Facebook's dimmest crooks (and smartest detectives).
  • Beyond the smartphone battle: Seven patent lawsuits you should know about

    Posted March 10, 2010 - 4:28 am

    On any given day in court, some companies you deal with are either suing or being sued over patents. Here's why you should care.
  • Pornography filters in India have little impact

    Posted January 14, 2010 - 10:10 am

    Search engines and other Web sites in India are required by law to filter pornographic content. But the opportunity for circumvention is so large, and government interest in prosecution so low, that the country is better off doing away with the laws, analysts said.
  • Internet phone systems become the fraudster's tool

    Posted October 27, 2009 - 9:10 pm

    Cybercriminals have found a new launching pad for their scams: the phone systems of small and medium-sized businesses across the U.S.
  • Wikileaks leader talks of courage and wrestling pigs

    Posted October 27, 2009 - 7:10 pm

    In early March, two human rights lawyers from Kenya were on their way to give testimony about illegal killings by police when their car was blocked and they were shot dead at close range.
  • Organized Cybercrime Revealed

    Posted September 28, 2009 - 1:47 pm

    As if CSOs don't have enough on their plates, they now need to beat back made men, capos and the other elements of the Mafia. Yes, the Mafia is formally involved in cybercrime, or so alleges the U.S. attorney for Florida, who filed charges against associates of the Bonanno crime family that included pilfering data from Lexis-Nexis.
  • License audits: Preparing now can ease the pain

    Posted September 18, 2009 - 6:57 pm

    Oracle licensing consultant Eliot Arlo Colon still remembers the enormous global publishing company that was "so darn confident" it would breeze through an upcoming software license audit unscathed.
  • An Amazing Laptop Recovery Story

    Posted September 17, 2009 - 9:15 am

    This is a true story about sex, computers, the Internet, spying, theft, intrigue, and the police--and it all began this past February when David Krop made the mistake of leaving his two laptop computers inside a locked SUV in a parking garage.
  • Piracy's global economic impact debated

    Posted September 14, 2009 - 1:42 pm

    There's no question that software piracy is a global problem with a heavy financial impact. But just how heavy it is is a matter of debate.
  • Gotcha! Pursuing software pirates

    Posted September 14, 2009 - 1:41 pm

    You might not realize it, but two out of every 10 of your co-workers might be using pirated software, according to industry statistics. You might be, too, for that matter, particularly if you work in manufacturing or at a small or midsize company with 100 to 500 PCs. You just might not know it.
  • Should the New Mantra Be: "Free as in Data"?

    Posted July 22, 2009 - 8:03 pm

    Power is no longer about who can access the source code. It's about who controls the data.
  • Universities Cope with New Anti-Piracy Requirement

    Posted June 22, 2009 - 11:08 am

    David Reis, director of IT security and policy at Thomas Jefferson University in Philadelphia, has been on what he calls a "nine-month journey" to figure out exactly how he's going to make sure his school doesn't break the law -- even though they were never in trouble in the first place.
  • When the FBI Raids a Data Center: A Rare Danger

    Posted April 27, 2009 - 10:49 am

    The question of how search and seizure laws are being interpreted for assets hosted in third-party facilities is an issue of concern for anyone with a stake in cloud computing.
Join us:






Join today!

See more content
Ask a Question