- Journal Archives
- Volume 16
- Volume 15
- Volume 14
- Volume 13
- Volume 12
- Volume 11
- Volume 10
- Volume 9
- Volume 8
- Volume 7
- Volume 6
- Volume 5
- Volume 4
- Volume 3
- Volume 2
- Volume 1
Currently viewing the tag: "internet"
Facebook announces a more “holistic” approach to removing violent media (despite outright ban on nudity/drugs/etc.).Continue Reading →
It should come as no surprise that Supreme Court Justices are not the most tech-savvy bunch. After all, they still haven’t “really gotten into email.” But maybe that’s for the best. In at least one instance, the Court’s foray into new technology has been shaky.
According to a new study [...]Continue Reading →
Once again we had many news items this week, so we are posting a second round-up. We found a number of legal technology projects attempting to change the way laws are made, interpreted, and complied with far into the future.
How will lawmaking, legal education, and legal practice look in fifty [...]Continue Reading →
On October 14, 2013 By Torrey Samson November 5, 2013
Privacy & Social Media:
California creates a minor’s right to be forgotten online. (In contrast, the EU Court of Justice found in June that EU law contains no general right to be forgotten.) [H/T Privacy, E-Commerce & Data Security's Summer 2013 Newsletter (PDF)] Google may be getting ready to use your [...]Continue Reading →
There were a lot of items this week, so we are publishing a Wednesday Morning JETLawg in addition to our usual Monday Morning JETLawg:Continue Reading →
On October 2, 2013 By Patrick Tricker January 26, 2014
If prosecutors are going to effectively prosecute identity theft and stolen computer code, New York needs to upgrade its laws for the 21st Century, according to a report [PDF] released last week by a New York State task force led by Manhattan district attorney Cyrus R. Vance, Jr.
New York’s criminal code has not [...]Continue Reading →
Last week, RSA, the security division of EMC, recommended that its customers stop using a community-developed encryption algorithm standard known as Dual EC DRBG because the NSA had inserted a backdoor into that cryptographic key creation product. This move by RSA came after the NIST issued a [...]Continue Reading →
Tagsadvertising antitrust Apple books career celebrities contracts copyright copyright infringement courts creative content criminal law entertainment Facebook FCC film/television financial First Amendment games Google government intellectual property internet JETLaw journalism lawsuits legislation media medicine Monday Morning JETLawg music NFL patents privacy progress publicity rights radio social networking sports Supreme Court of the United States (SCOTUS) technology telecommunications trademarks Twitter U.S. Constitution