Read need-to-know updates, commentary, and analysis on Communications & Media issues written by leading professionals.
FCC Proposes New Rules On Local Wireless Siting
Data Center Networks – Interview with Jeff Moerdler, Member, Mintz Levin
What to expect from FCC Post-Governement Shutdown
Employer Social Media Policies – Interview with Mitch Danzig, Member, Member, Mintz Levin
Jason Maloni on Data Security
JOBS Act Implementation Regulations
Ernest DelBuono on Aviation
Jack Deschauer on Government Investigations
PODCAST - Inside Law - Public Policy Issues in 2013
Condo Adviser: Condominium Rules and Enforcement
Condo Adviser: What is 'FHA approved,' exactly?
Condo Owners and Dealing with Uncooperative Management Companies
Reserve Funds: Purposes and Common Mistakes
Instapundit: America's IP Laws Need to be "Pruned Back"
Social Media At Work - What's Allowed and What Isn't? PODCAST - Inside Law
Release of new book on the 'Best Practices Under the FCPA and Bribery Act"
[Legal Perspective] When Is It NOT Okay to Delete Your Social Media Account?
Tips for Mobile App Privacy Compliance
Serving Legal Documents Through Social Media
Social Media Law Report - Who Owns Your LinkedIn Account, FTC Guidance on Social Ads, More...
Smartphones and tablets are everywhere. Largely prompted by Apple, Samsung, and Google’s consumer-centric marketing strategies, people are spending more and more money on the latest and fastest mobile devices, upgrading them...more
I recently addressed the general implications of the Stored Communications Act on locating and retrieving electronic evidence in a Law360 article entitled “A Hurdle to Obtaining Electronic Evidence.” As explained by the Ninth...more
In this LEVICK Daily video interview, LEVICK Senior Vice President Jason Maloni discusses the key forensic and communications challenges that accompany instances of data loss and...more
While many cases focus on electronic evidence available on employee laptops and behind corporate firewalls, massive volumes of electronic evidence can be found on the servers of companies that provide electronic processing...more
In civil discovery, defense lawyers are seeking plaintiff's social media (meanwhile, a defendant-corporation likely has little social media to worry about). BUT, plaintiffs are seeking defendant's e-discovery (which the...more
This article discusses the Patreaus affair from the standpoint of practical email privacy tips for lawyers, law firms, their clients, and families. A brief explanation is provided how emails (or even fake email addresses)...more
What Does a Child Pornography Case Tell You About Computer Evidence? was published in the November 2012 Palm Beach Bar Bulletin and discusses the recent United States v. Seiver case as well as the simple steps for lawyers,...more
Highlighted in Forbes’ Law & Technology Blog as one of Eight Great Law & Technology Resources, Orange Legal Technologies’ Unfiltered Orange Weekly eDiscovery News Updates provide readers with a trusted compilation of key...more
This article explains to in-house corporate counsels the risks, benefits, and issues to investigate regarding cloud storage of data....more
Reconsider how you select a jury by considering these tips and statistics on how your potential jurors use the internet....more
Lawyers are fond of their smartphones and tablets but slow to realize the potential harm of those automatic signature lines such as "sent from my iphone." This article from the July / August 2011 Palm Beach Bar Bulletin...more
This article explains how lawyers can obtain and use the location data of a party's or witness' iPhone in civil suits. While this has been talked about, this is the first (known) article to explain the technology as well as...more
This article, published in the June 2011 issue of the newsletter of the Maryland Chapter of the Federal Bar Association, discusses the powerful tool that social media has become. Social media is too difficult to ignore and...more
Compiled by Orange Legal Technologies from online public domain resources, provided for your review/use is this week’s update of key industry news, views, and events highlighting key electronic discovery related stories,...more
This article discusses common password practices based upon a number of recent surveys and news stories. It then proposes several password habits and guidelines, including the ones used by rocket scientists at NASA.
The pen has become even mightier since Facebook and its kin stepped into the courtroom.
Today, courts consider social media posts to be beyond the purview of the right of privacy - and fully admissible in court. Now, with...more
Weekly update of key industry news, views, and events highlighting electronic discovery related stories, developments, and announcements....more
TABLE OF CONTENTS
I. EMPLOYEE INTERNET USAGE AND OTHER EMAIL POLICIES AND OUTSOURCING
II. DOCUMENT RETENTION POLICIES
III. MANAGING YOUR WEB PRESENCE
IV. PRIVACY ISSUES
V. COPYRIGHT MISUSE