Information Technology Lawyers in the USA

Information Technology Lawyers in the USA Other Countries



All Articles »Information Technology - Recent Legal Articles

  • A Ransomware Infection Risks Business Health

    Ransomware is a menacing cyber threat because it exposes a business to cyber extortion. A ransomware infection can harm a business by opening up its legal risks and shutting down its operations.

  • Cryptocurrency Legal Considerations
      by HG.org

    Cryptocurrency is another term for online currency options such as Bitcoin. This is a manner of exchange for payments and to ensure transactions for both consumer and business items online. While the general payment option is over the internet, there are transferrable processes between cryptocurrency and bank accounts.

  • How Expert Witnesses Help in Unlawful Collection of Consumer Data Cases
      by HG.org

    Consumer data is available almost everywhere online. Anyone that visits almost any website leaves a trail of information in his or her wake. However, there are methods employed to collect these details that are considered illegal.

  • How an Expert Witness Can Help in a Data Security Breach Case
      by HG.org

    Data security is crucial in both keeping information safe and running a business that relies upon online and networked transactions. As more companies are progressing forward through the future in the electronic age, data security and information systems become the most important aspects of a business.

  • Keeping Digital Data Safe
      by HG.org

    Keeping digital data protected and safe from others is not always easy or possible. However, there are various methods that are employed by knowledgeable tech persons which may provide safeguards from loss of data, corruption and hacking.

  • Protecting Your Website from Liability
      by HG.org

    Websites fall prey to liability just as businesses and company owners do through various acts, terms, users and injuries. There are many website creators that are sued based on the content and lack of content within the pages.

  • The Need for Hosting Account Protections through Secure Socket Layers
      by HG.org

    Hosting accounts are the housing of a website’s content. The files, photos, video and audio files are contained in these hosting accounts, and with the right coding and server information, a site may be viewed online for the public consumption. Some of these have password protected areas, some are membership based and some are available to everyone.

  • IT Services Agreements: Liability of Outsourced IT Services

    Over the years, technological advances have allowed many companies to outsource much of the creation, maintenance and support of their information technology (“IT”) systems. Today, there are many IT service providers providing managed network services, hosted services, cloud-based services and software-as-a-service.

  • Court Ruling Strengthens Protections Against Cell Phone Tracking

    A judge from the federal district of southern New York has decided to invalidate evidence obtained through the use of a cell phone tracking device. This decision may serve to clarify rules about when it is appropriate to use such technology with and without a warrant.

  • The Tao of Discovery

    More than two thousand years ago, the Chinese warrior-philosopher Sun-Tzu wrote a treatise on military strategy called The Art of War. Since that time, this legendary text has become required reading throughout Asia. Whether in business school, the armed forces, or in law school, it is likely that every student is familiar with the fundamental principles of Sun-Tzu’s masterpiece.


Find a Lawyer

Find a Local Lawyer