0 results for '*'
Can Snooping Spouses Use Spyware Evidence in Court?
Is your spouse cheating on you? And if so, can you prove it? Increasingly, people are turning to Internet monitoring software -- also known as spyware -- to find the smoking gun. But can you use this evidence in court as part of a divorce case? Attorney Meredith Brennan examines a recent Florida case addressing the admissibility of evidence of a spouse's online affair obtained through the use of spyware.Why the FTC Should Take the U.K.'s Lead on the Internet
In May, the Federal Trade Commission announced it was undertaking a review of its "Dot Com Disclosure Guidelines," adopted in 2000 to provide insight to marketers using the internet. Doug Wood, of Reed Smith, takes an envious look across the Atlantic to answer the question: Do sellers and consumers really need more guidance from the FTC on internet marketing practices?Authenticating E-Mail Discovery as Evidence
At some point, e-discovery needs to be converted into e-evidence for summary judgment or trial. Attorneys Beatrice O'Donnell and Thomas A. Lincoln suggest practical methods to employ the rules of evidence to confront the special admissibility problems posed by e-mail.View more book results for the query "*"
N.J. Candidate for Bar Trustee Stripped of E-Mail Privileges
Sara Cores, a candidate for a New Jersey Bar Association trustee seat who sent campaign literature via the organization's e-mail distributor, has been banned from using it for the rest of the election, while her opponent gets one shot at a fair response. Cores says she sent only one campaign-related e-mail using the distributor and that the policy on campaign e-mails is unclear.Moving Computer Chips Beyond Moore's Law
Gordon Moore's famous 1965 proclamation, which implied microprocessing chip speed could double every two years, is nearly obsolete, says our commentator. With no new way to wring more performance from today's standard technology, he says, the wave of the future is multiple-core processors. They will break up different tasks currently handled by one microprocessor -- encryption, decryption, data flow -- and do them in parallel.GCs and Directors Now See Cybersecurity as No. 1 Risk
A new survey of 1,957 general counsel and 11,340 corporate directors at public companies shows that data security issues are now the top concern at many corporations, but what are companies doing about the need to secure their data and networks?Trending Stories
Law Offices of Gary Martin Hays & Associates, P.C.
(470) 294-1674
Law Offices of Mark E. Salomone
(857) 444-6468
Smith & Hassler
(713) 739-1250