Internet and Technology
» Cybersecurity
-
By Rhodes, Jill D. American Bar Association. Third edition. 2022.
The ABA Cybersecurity Handbook: A Resource for Attorneys, Law Firms and Business Professionals, Second Edition is published by the ABA Cybersecurity Legal Task Force which is composed of ABA members with expertise in cybersecurity as well as government, technical and private sector representation. The Second Edition of this top selling cybersecurity book is a must read for anyone working in the field including private practice attorneys and associates, in-house counsel, non-profit and government attorneys and others. Since the release of the first edition published in 2013, cybersecurity breaches in law firms have made news headlines and clients are asking questions about lawyers' and firms' security programs. From the massive Panama Papers breach that led to the dissolution of the Mossack Fonseca Law Firm in April 2016 to the WannaCry and Petya Ransomware attacks, the latter that led to the several day work outage at DLA Piper in June 2017, it is imperative that attorneys understan…
Read online: https://lexisdl.com/library/txsll/title/3899456
-
By Rhodes, Jill D. American Bar Association. Third edition. 2018.
This third edition of The ABA Cybersecurity Handbook updates and expands upon the issues raised in the first two editions. The cybersecurity landscape has undergone seismic changes since the publication of the second edition in 2017. The COVID-19 pandemic has brought new levels of technology integration to the practice of law, accompanied by new and expanded cybersecurity risks. Beyond the legal profession, the SolarWinds, Kaseya, and Colonial Pipeline breaches have set new and alarming precedents. Heightened cybersecurity risk worldwide has prompted increased responses from the US federal government and from the international community. Amid these ongoing developments, the Handbook is at your fingertips as a guide to preparing for and responding to cybersecurity threats and incidents. The foundational information it shares will remain relevant even in a changing environment. The recommendations within each chapter, located at the end, provide an easy guide for developing and imple…
URL: https://lexisdl.com/library/txsll/title/3899456
-
By Robinson, Nicholas A. RAND Corporation. 2011.
This report discusses how policy-makers might address the challenges and risks in respect of the security, privacy and trust aspects of cloud computing that could undermine the attainment of broader economic and societal objectives across Europe.
Read online: https://lexisdl.com/library/txsll/title/680165
-
Latest received: Automatic updates. Aspen Law & Business. c2000-.
The Computer & Internet Lawyer provides action-oriented guidance by nationally known computer lawyers to resolve the problems that face manufacturers, developers, distributors, and users of computer, telecommunication and online products and services.
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://apps.fastcase.com/PartnerBenefits/?IPKey=YqgsCx3zssdVGvBwDN%2bWkECjLVh6HJPUvW1vkc9Yupy1%2fXe8U%2fs2zNBjN1vWoaL0D4FAJvcGJrPFPMjrHFYNHTRYXRJsKrW1cwOm8ig3UPdj6asCU7XHbi2N3WlshdNF&LogoutUrl=https://www.sll.texas.gov&returnurl=https://fc7.fastcase.com/outline/TX/735?docUid=253711141
-
By Kesan, Jay P. West Academic Publishing. First edition. 2019.
The reliance on technology and the internet during the COVID-19 pandemic has led to an increase in cybersecurity attacks. This Nutshell volume compiles information about state, federal, and international laws related to cybersecurity and data privacy.
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=26367
-
By Bandler, John T. American Bar Association. 1;2017-09. 2017.
Why this book? Most have neither considered, nor know how "cyber secure" they are. For the majority who are not information technology (IT) professionals, the idea of delving into the technical details of secure computing can create apprehension and confusion. Some people think that if their email system works, and if their documents are accessible, then why bother making any security improvements to their system, which might create complications or cost time and money. Some would prefer not to know the cybercrime risks they are facing, or just haven't thought about it. Cybersecurity is more, though; it is also about protecting data from risks other than cybercrime, such as unanticipated IT issues, hard-drive crashes, house fires, and other incidents. Beyond security, this book will also provide information to use computers and data more efficiently. No matter an individual's level of comfort or experience with computers, this book will help recognize when electronic "doors" are open …
Read online: http://lexisdl.com/library/txsll/title/3596015
-
By Mireles, Michael S. West Academic Publishing. First edition. 2021, c2022.
This book provides an overview of cybersecurity laws. It discusses state laws on student privacy and data breach notification, federal laws such as the Gramm-Leach-Bliley Act and the Health Insurance Portability and Accountability Act, and other topics including ransomware, hacking, and the Internet of Things.
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=27697
-
By Brummer, Chris. West Academic. First edition. 2019.
This title provides an overview of financial technology services and the rules that regulate them.
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=26685
-
By Rustad, Michael. West Academic Publishing. Fourth edition. 2021.
This timely and up-to-date Hornbook comprehensively examines topics such as Internet technologies, Internet governance, global consumer protection, cybertorts, Internet-related privacy, copyright, trademarks and domain names.
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=27638
-
By Gantt, Andrew. American Bar Association. 2021.
Maintaining cybersecurity in today's technologically driven world is vital to the health of any business. Media outlets continue to report on large-scale data breaches affecting millions of consumers' information and costing companies millions, and sometimes even billions, of dollars to rectify. Organizations, particularly those within or touching the healthcare industry, remain the most attractive of targets for cyber attackers given the higher and lasting value of personal health information. The goal of this book is to help bolster stakeholders' knowledge of cybersecurity in the healthcare industry, with the aim of pinpointing current and impending threats to the industry's data security. The topics to be addressed include types of cybersecurity threats; ransomware in healthcare; how to prepare for and respond to cybersecurity attacks; the cost of inadequate security measures; and managing privacy and cybersecurity risks.
URL: https://lexisdl.com/library/txsll/title/6439034
-
By Law, Section of Science and Technology. American Bar Association. 1;1. 2014.
Today more than ever, legal practitioners need to fully understand the obligations, liabilities, risks and treatments involving information security and privacy. Top executives must have a firm grasp of the information security and privacy statutes and regulations in each country where they do business, including any industry sector-specific rules. This book provides a practical and comprehensive approach to information security and privacy law for both international and domestic statutes. It provides all the tools you need to handle the business, legal and technical risks of protecting information on a global scale. For anyone responsible for or advising a corporation involved in domestic or international business, who must comply with a dizzying array of statutes, regulations, technologies, methodologies and standards, this book is the invaluable resource you've been looking for.
Read online: http://lexisdl.com/library/txsll/title/1744172
-
Latest received: Automatic updates. Aspen Law & Business. Tenth edition. [c2011?]-.
"Internet and Technology Law Desk Reference, Tenth Edition is the best reference to explain today's high-tech terms, legal doctrines, acronyms, and jargon, as the terms have been defined in court decisions, statutes, regulations, or industry usage. The Internet and Technology Law Desk Reference covers over 2,400 legal and technical terms - the most comprehensive listing of its kind. So you can advise clients, draft contracts, and litigate cases, confident that you're using accurate terminology backed by legal precedent." -publisher's description
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://apps.fastcase.com/PartnerBenefits/?IPKey=YqgsCx3zssdVGvBwDN%2bWkECjLVh6HJPUvW1vkc9Yupy1%2fXe8U%2fs2zNBjN1vWoaL0D4FAJvcGJrPFPMjrHFYNHTRYXRJsKrW1cwOm8ig3UPdj6asCU7XHbi2N3WlshdNF&LogoutUrl=https://www.sll.texas.gov&returnurl=https://fc7.fastcase.com/results?docUid=68468314
-
By Cwik, Cynthia H. American Bar Association. 1;2019-05. 2019.
The Internet of Things encompasses the ability to connect and direct almost any kind of mechanical system, whether it's automotive, medical, residential, or critical infrastructure. IoT technologies hold tremendous promise for our communities by making them safer and more efficient. As with any other technology, they also entail security risk, and the risks associated with IoT technologies must be aggressively managed. We can do so, with industry's help, by working to leverage standards and liability and insurance mechanisms to ensure that IoT's foundational building blocks are secure and effective. Increasingly, utilities are deploying smart grid technologies, wirelessly connecting thermostats to the utility to measure usage patterns and allow energy supplies to be adjusted, with precision based on need. Companies are working on clocks, kitchen appliances, and other household products that monitor consumer behavior to turn on your coffee machine moments before you wake up; warn you wh…
Read online: http://lexisdl.com/library/txsll/title/4742306
-
By Spernow, Bill. American Bar Association. 1;2017-05. 2017.
Law firms can mitigate the risk of a data breach through a variety of means, including: investing in cybersecurity tools, hiring internal and external cyber resources to augment the firm's current information security practices, and arguably most importantly changing the firm's culture to be more security conscious. No one size fits all solution exists for dealing with cyber threats, but with proper focus and resources, a firm can consider its unique factors and develop an information security posture that addresses its most compelling concerns. While preventing a breach should be a paramount concern for any law firm, it is similarly important to prepare for what happens in the event that a breach occurs. Although there are options, such as cyber insurance, to help mitigate the direct costs of a breach, law firms must also look to other options to resolve these issues expeditiously. As the costs associated with litigating data breach claims continues to climb, it will become increasing…
Read online: http://lexisdl.com/library/txsll/title/3293631
-
Latest received: Automatic updates. By Delta, George B. Aspen Publishers. Fourth edition. [2018?]-.
"This up-to-date legal resource covers electronic commerce and online contracts, privacy and network security, intellectual property and online content management, secure electronic transactions, cryptography, and digital signatures, protecting intellectual property online through link licenses, frame control and other methods, online financial services and securities transactions, antitrust and other liability." -publisher's description
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://apps.fastcase.com/PartnerBenefits/?IPKey=YqgsCx3zssdVGvBwDN%2bWkECjLVh6HJPUvW1vkc9Yupy1%2fXe8U%2fs2zNBjN1vWoaL0D4FAJvcGJrPFPMjrHFYNHTRYXRJsKrW1cwOm8ig3UPdj6asCU7XHbi2N3WlshdNF&LogoutUrl=https://www.sll.texas.gov&returnurl=https://fc7.fastcase.com/outline/TX/735?docUid=171725224
-
By Nelson, Sharon D. American Bar Association. 1;2016-06. 2016.
In the four years since the initial publication of Locked Down, data security has exploded as a concern for law firms. At the time, many attorneys were not paying attention to data security. But with the growing number of data breaches, no attorney can afford to ignore these developments. With quickly advancing technology to prevent, detect and respond to intrusions and ever-evolving threats, keeping up on the latest information you need to protect your confidential data can be a daunting task. The second edition of Locked Down is the answer to this challenge. Authors Sharon D. Nelson, David G. Ries, and John W. Simek are recognized experts in cybersecurity, and their lectures draw standing-room-only crowds. They give you the data security basics you need in simple, easy-to-understand language. You can manage your risk by following the practical advice provided in this book.
Read online: http://lexisdl.com/library/txsll/title/2821678
-
By Carter, T. Barton. West Academic Publishing. Eighth edition. 2020.
"Mass Communication Law in a Nutshell satisfies the need for a basic text in communication law, not only for law students but for journalism and communication students as well. Highlights of the Eighth Edition of the popular book include a discussion of Hulk Hogan’s successful lawsuit against Gawker for public disclosure of private facts, the right to be forgotten (or “erased”) in Europe, and numerous social media issues, including cyberstalking, catfishing, trolling, doxing, swatting, posting threats on Facebook and access to President Trump’s tweets. Further highlights include the USA FREEDOM Act, the Supreme Court’s expansion of exemption 4 of FOIA, First Amendment limits on denials of trademark registration, the Broadcast Spectrum Auction, and the continuing battle over net neutrality." - publisher's description
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=26766
-
By Mireles, Michael. West Academic Publishing. Second edition. 2024.
"This book is for cybersecurity and privacy professionals, cybersecurity and privacy lawyers, law students, and anyone interested in learning the cybersecurity laws that apply to an entity based on the entity’s business model(s) and data collection model(s). For example, what is the applicable Securities and Exchange Commission (SEC) cybersecurity law if an entity provides an alternate trading platform (ATP) with a daily trading volume of 50,000? The authors combine years of technical and legal experience in providing a map for cybersecurity counseling based on an understanding of the CISO’s technical cybersecurity issues and how they fit into today’s cybersecurity law challenges. The authors explain the difference and overlap between privacy law, cybersecurity law, and cybersecurity. Those interested in speaking the same cybersecurity language as a Chief Information Security Officer (CISO) will benefit. The first chapter provides a review of cybersecurity. For example, key to any disc…
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=28367
-
By Soma, John T. West Academic Publishing. Second edition. 2014.
"The Privacy Nutshell briefly reviews the historical roots of privacy, and then examines each of these U.S. privacy statutes and regulations. Virtually all governments and businesses face privacy considerations as technology continues to evolve. Legal issues related to privacy are exploding on the U.S. legal scene. The EU has a long history of a strong regulatory privacy regime. The U. S., however, follows a sectoral approach to privacy, whereby Congress responds to each privacy “crisis” with a new statute and set of regulations. This sectoral approach has resulted in a unique series of privacy rules for different areas of society. The Privacy Nutshell is an excellent introductory guide to the legal privacy world." -publisher's description
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=23394
-
By Serwin, Andrew B. American Bar Association. 1;1. 2014.
Information security and privacy issues are not new, but mass attention and compliance efforts are at an all-time high, and are increasing as litigation and high-profile security breaches continue to draw attention. Current hot topics in information security and privacy include pretexting; financial privacy; privacy litigation; outsourcing to foreign countries; electronic health and personal records; and social networking. With these issues, a large number of laws have been passed to regulate the information security and privacy issues. Compliance with these laws is a legal reality as well as a business necessity. Privacy, Security and Information Management will help you decipher that laws that regulate these issues and help your clients and business comply with the requirements to avoid security and privacy breaches. Topics covered include internet privacy, financial privacy, unauthorized access to networks and information, wiretapping and privacy in electronic communications, iden…
Read online: http://lexisdl.com/library/txsll/title/1744216
» Mass Communication Law
-
Latest received: Automatic updates. By Harak, Charlie. National Consumer Law Center. Sixth edition. c2018-.
This is a treatise covering the laws and regulations of delivery of electricity, gas and telecommunications services.
Note: To view online, click on its title from the NCLC website homepage. Or click on “My NCLC” and browse for it by title.
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://library.nclc.org/my-nclc
Read online Detailed table of contents View details in library catalog
-
By Mableson, Connie J. American Bar Association. 2;2018-04. 2018.
The online environment is constantly evolving, and the case law and processes under the Digital Millennium Copyright Act (DMCA) are always changing to keep pace. The second edition of the DMCA Handbook provides a practical understanding of what online service providers (OSPs and ISPs), website owners, content creators, and copyright owners need to know to protect their respective online interests and enjoy immunity from infringement. This resource provides a quick-start guide for focusing on basic requirements to prepare and file the forms and notices relevant to specific pursuits. It also offers a more in-depth analysis of the DMCA process and case law for those who want additional background about the origins and operation of the DMCA regime. Inside the book and on its related website are essential DMCA forms and appendices, that include: Letter the OSP Promptly Sends to Alleged Infringer DMCA Take-Down Notice Sent by Copyright Owner to OSP (Fill-in or Automated) DMCA Designated …
Read online: http://lexisdl.com/library/txsll/title/3974601
-
By Carter, T. Barton. West Academic Publishing. Eighth edition. 2020.
"Mass Communication Law in a Nutshell satisfies the need for a basic text in communication law, not only for law students but for journalism and communication students as well. Highlights of the Eighth Edition of the popular book include a discussion of Hulk Hogan’s successful lawsuit against Gawker for public disclosure of private facts, the right to be forgotten (or “erased”) in Europe, and numerous social media issues, including cyberstalking, catfishing, trolling, doxing, swatting, posting threats on Facebook and access to President Trump’s tweets. Further highlights include the USA FREEDOM Act, the Supreme Court’s expansion of exemption 4 of FOIA, First Amendment limits on denials of trademark registration, the Broadcast Spectrum Auction, and the continuing battle over net neutrality." - publisher's description
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=26766
-
By Section of Antitrust Law of the American Bar Association. American Bar Association. 3;2020-04. 2020.
The Telecom Antitrust Handbook, Third Edition is intended to serve as a comprehensive review and analysis of the application of antitrust law and principles to the telecommunications industries (including wireline and wireless telecom, broadband access, and video programming distribution) for use by telecom and antitrust counsel in evaluating the many competitive issues that arise in the telecom markets. The book guides the reader through the fundamental economic underpinnings of communications networks that make substantive analysis of antitrust issues in these sectors both unique and challenging (Chapter I), and then transitions to a discussion of the history of regulation and monopolization issues in the industry (Chapter II), restraints of trade (Chapter III), joint ventures (Chapter IV), mergers (Chapter V), immunity issues (Chapter VI), and finally an overview of consumer protection issues (Chapter VII), including the evolving regulation of consumer privacy.
Read online: http://lexisdl.com/library/txsll/title/5433219
» Social Media
-
By Pearson, Mark. 2012.
Learn how to communicate online without crossing any legal boundaries.
Read online: https://lexisdl.com/library/txsll/title/1552541
-
By Shaw, Thomas J. American Bar Association. ;1. 2014.
The future is digital, centered on the Internet. Today's children must fully embrace the capabilities offered by the many technologies and services available on the Internet. But in doing so, children become exposed to significant risks. So parents, schools, organizations, and lawyers must understand these risks and how to safeguard children's experiences online. The Internet is both dynamic and global, requiring assessment of current and emerging risks and local and global laws. This important new book provides a practical and comprehensive approach to the experiences of children online, including the risks they encounter as active and passive participants with the Internet. It includes methodologies for analyzing national and international laws, best practices for assessing and treating the online risks to children and parents, and advice on how to get started. In short, it is a complete methodology for lawyers, parents, schools, and organizations interacting with children. This book…
Read online: http://lexisdl.com/library/txsll/title/1896048
-
Latest received: Automatic updates. Aspen Law & Business. c2000-.
The Computer & Internet Lawyer provides action-oriented guidance by nationally known computer lawyers to resolve the problems that face manufacturers, developers, distributors, and users of computer, telecommunication and online products and services.
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://apps.fastcase.com/PartnerBenefits/?IPKey=YqgsCx3zssdVGvBwDN%2bWkECjLVh6HJPUvW1vkc9Yupy1%2fXe8U%2fs2zNBjN1vWoaL0D4FAJvcGJrPFPMjrHFYNHTRYXRJsKrW1cwOm8ig3UPdj6asCU7XHbi2N3WlshdNF&LogoutUrl=https://www.sll.texas.gov&returnurl=https://fc7.fastcase.com/outline/TX/735?docUid=253711141
-
By Jacobs, Thomas A. American Bar Association. ;2020-09. 2020.
Cyberbullying is the first pandemic of the twenty-first century. No country has escaped this phenomenon since the Internet became mainstream and litigation commenced in the 1990s. In fact, 2020 even witnessed cyber-abuse related to the novel coronavirus (COVID-19) as well as race relations and protests. Cyberbullying Law presents cases, comments, and legal research for attorneys, judges, and anyone interested in the rights and responsibilities of those involved in cyber abuse or harassment. Due to the ubiquity of all things digital, litigants invariably become enmeshed in electronic communication. This may lead to petitions for orders of protection or sua sponte orders from the bench regarding communication among parties, victims, and witnesses. Practitioners in civil and criminal courts, or family and juvenile courts regularly confront instances of cyber abuse, whether constituting harassment, intimidation, stalking or threats. First Amendment protections are not absolute, although …
Read online: http://lexisdl.com/library/txsll/title/5773524
-
By Rustad, Michael. West Academic Publishing. Fifth edition. 2021.
"Global Internet Law in a Nutshell presents a very timely overview of legal issues that arise from the World Wide Web. Topics include Internet-driven technologies such as Artificial Intelligence, Machine Learning Bitcoins, The Internet of Things, 3D Products Liability, and Driverless Cars. This edition emphasizes the legal and policy issues arising out of social media such as Twitter’s decision to permanently ban President Trump from its platform. The goal is to provide the reader with an up-to-date summary of the most important new cases and statutory developments. Each chapter provides the latest developments in Internet Law from the European Union such as the General Data Protection Regulation, which is setting a global standard for privacy and data protection. Each chapter has examples and explanations of Internet Law developments from around the world. This Nutshell provides global coverage of recurring Internet issues that lawyers and law students will encounter in practice. It a…
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=27462
-
By Isaza, John. American Bar Association. 1;2018-03. 2018.
Social media presents many dilemmas in the business and legal world. Given the global nature of corporate business, the use of social media compels U.S. lawyers with international clientele to have an understanding of both U.S. and other jurisdictions. Handbook on Global Social Media Law for Business Lawyers discusses social media laws and related governance principally in the United States, with an examination of key global regions including Canada, the European Union, Australia and Asia. To help you better understand the legal challenges and implications surrounding social media, domestically and internationally, this practical resource includes guidance on: Use of social media as a tool in recruitment of employees The effect of privacy on an employer's ability to govern its employees FTC's general social media disclosure guidelines Cybersecurity and risk, including hacking, theft of corporate details, data loss, data breach, and more Intellectual property issues in social media B…
Read online: http://lexisdl.com/library/txsll/title/3899442
-
By Borger, John P. American Bar Association. 1;1. 2014.
If your company or your clients have a website you need this book. The ever changing digital landscape is a tricky place for legal practitioners and not understanding the rules of the game can cost your client dearly. Google/Youtube has spent over $100 Million defending against Viacom s $1 Billion copyright lawsuit. A judge ruled that the AFP and Getty Images must pay photographer Daniel Morel $1.02 Million in damages for using and distributing his Twitter photos of the earthquake in Haiti. A Connecticut ambulance company paid a former employee to settle a wrongful termination claim after she was fired for criticizing her boss on Facebook. This handy guide is a practical, usable and accessible tool for those with general legal knowledge who do not encounter this area of law regularly. It explores a wide range of legal issues facing anyone or any company with an online presence: defamation, invasion of privacy, copyright infringement, website terms of use, and employer s rights and ri…
Read online: http://lexisdl.com/library/txsll/title/1880581
-
By Jacobowitz, Jan L. American Bar Association. 1;2017-09. 2017.
As social media is inescapable, it's essential for attorneys to understand how to interact with it ethically. This handbook provides guidance for ethical "digital competence" - both when representing clients and when managing your practice's social media presence.
Read online: https://lexisdl.com/library/txsll/title/3596021
-
By Kennedy, Dennis. American Bar Association. 2;2. 2014.
This bestselling ABA book has been fully revised and updated to reflect significant changes to LinkedIn's layout and functionality made through 2013.
Read online: http://lexisdl.com/library/txsll/title/1880600
-
By Halpert, Marc W. American Bar Association. 1;2017-8. 2017.
Hundreds of millions of businesspeople use LinkedIn daily, not only to forge connections and nurture relationships, but also to search, assess, and choose reliable professionals. Understanding how best to use LinkedIn will give you an edge in tapping into LinkedIn's remarkable power to promote and connect your expertise. There are many books on LinkedIn that focus on "what to do," but not on the strategy of "why and how" to make LinkedIn a pivotal tool in the professional' marketing toolbox. Many "what to do," books are almost immediately are out of synch with the latest iteration of LinkedIn before they are even published. And with the latest changes to the LinkedIn user interface in March 2017, this book is up-to-date and relevant while the others are teaching what to do with the old interface. What remains constant, however, is the way each law firm, and for that matter, any sort of professional practice, expresses "why you do what you do" and "how well others say you do it." This b…
Read online: http://lexisdl.com/library/txsll/title/3444817
-
By Black, Nicole. American Bar Association. 1;1. 2014.
The world of legal marketing has changed with the rise of social media sites such as Linkedin, Twitter, and Facebook. Law firms are seeking their companies attention with tweets, videos, blog posts, pictures, and online content. Social media is fast and delivers news at record pace. Social Media for Lawyers: The Next Frontier provides you with a practical, goal-centric approach to using social media in your law practice that will enable you to identify social media platforms and tools that fit your practice and implement them easily, efficiently, and ethically. Beginning with a brief historic overview of social media, this guide describes the current trends and statistics on current use, as well as explains why social media is important for lawyers, and busts some of the myths that deter lawyers from engaging in social media. Included are: • descriptions and screen shots of various social media platforms and step-by-by advice on setting up a profile • …
Read online: http://lexisdl.com/library/txsll/title/1744218
-
By Garcia, Ryan. West Academic Publishing. Second edition. 2022.
"Social media has transformed how the world communicates. Its impact has been felt in every corner of our society including the law. Social Media Law in a Nutshell is a wide-ranging look of how the social media transformation has impacted various legal fields. From marketing to employment to torts to criminal law to copyright and beyond, virtually every legal field has been changed by social media. By looking at high level concerns and example cases, Social Media Law in a Nutshell attempts to give practitioners exposure to social media issues and concerns so they can better advise clients and approach the new social media world with their legal eyes opened to new and old risks alike. This book can also serve as a text for law professors looking to expose law students to the burgeoning area of Social Media Law." - publisher's description
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=27782
-
By Hudson, David L. Greenwood. Third edition. [2015].
A book that covers the legal rights of young adults in all aspects of their daily lives such as at home, at school and on the job. The third edition includes information on emerging topics such as cyber-bulling and sexting as well as recent changes to laws on privacy and LGBTQ rights.
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://go.gale.com/ps/i.do?p=GVRL&sw=w&u=aust34807&v=2.1&it=aboutBook&id=GALE%7C8NOZ&sid=bookmark-GVRL
» Web & Software Development
-
Latest received: Automatic updates. Aspen Law & Business. c2000-.
The Computer & Internet Lawyer provides action-oriented guidance by nationally known computer lawyers to resolve the problems that face manufacturers, developers, distributors, and users of computer, telecommunication and online products and services.
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://apps.fastcase.com/PartnerBenefits/?IPKey=YqgsCx3zssdVGvBwDN%2bWkECjLVh6HJPUvW1vkc9Yupy1%2fXe8U%2fs2zNBjN1vWoaL0D4FAJvcGJrPFPMjrHFYNHTRYXRJsKrW1cwOm8ig3UPdj6asCU7XHbi2N3WlshdNF&LogoutUrl=https://www.sll.texas.gov&returnurl=https://fc7.fastcase.com/outline/TX/735?docUid=253711141
-
By Scelsi, Chrissie. American Bar Association. 2;2019-02. 2019.
?The intersection between intellectual property law and video games and immersive entertainment is exciting, fast-paced, and complex, as technology evolves at breakneck speed and often outpaces established case law. Game developers routinely wrestle with all aspects of IP law and need counsel on end-user license agreements; ownership and challenges of user-generated content; the scope and limitations of copyright protection; remedies for trade secret appropriation; duration of right of publicity protection; approaches for simulating reality without running afoul of existing trademark and brand rights of real-world companies and people; ramifications of international law; and more. This new edition of Computer Games and Immersive Entertainment covers a broader range of topics and helps lawyers understand the ongoing changes, developing creative and nimble solutions to protect companies while still engaging the players.
Read online: http://lexisdl.com/library/txsll/title/4578038
-
Latest received: Automatic updates. By Battersby, Gregory J. Aspen Publishers. Second edition. c2010-.
This book contains best practices and example agreements for those who run a website or conduct commerce on the web.
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://apps.fastcase.com/PartnerBenefits/?IPKey=YqgsCx3zssdVGvBwDN%2bWkECjLVh6HJPUvW1vkc9Yupy1%2fXe8U%2fs2zNBjN1vWoaL0D4FAJvcGJrPFPMjrHFYNHTRYXRJsKrW1cwOm8ig3UPdj6asCU7XHbi2N3WlshdNF&LogoutUrl=https://www.sll.texas.gov&returnurl=https://fc7.fastcase.com/outline/TX/735?docUid=106700086
-
Latest received: Automatic updates. Aspen Law & Business. Fourth edition. 2002.
A practical guide to successful licensing strategies and techniques, this reference covers the gamut of license agreement issues, from valuation, intellectual property, and antitrust matters to tax and bankruptcy concerns. Each chapter is authored by one or more experts and provides detailed, practice-oriented analysis of key areas along with timesaving contract clauses and provisions.
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://apps.fastcase.com/PartnerBenefits/?IPKey=YqgsCx3zssdVGvBwDN%2bWkECjLVh6HJPUvW1vkc9Yupy1%2fXe8U%2fs2zNBjN1vWoaL0D4FAJvcGJrPFPMjrHFYNHTRYXRJsKrW1cwOm8ig3UPdj6asCU7XHbi2N3WlshdNF&LogoutUrl=https://www.sll.texas.gov&returnurl=https://fc7.fastcase.com/outline/TX/737?docUid=106766380
-
Latest received: Automatic updates. Aspen Law & Business. Tenth edition. [c2011?]-.
"Internet and Technology Law Desk Reference, Tenth Edition is the best reference to explain today's high-tech terms, legal doctrines, acronyms, and jargon, as the terms have been defined in court decisions, statutes, regulations, or industry usage. The Internet and Technology Law Desk Reference covers over 2,400 legal and technical terms - the most comprehensive listing of its kind. So you can advise clients, draft contracts, and litigate cases, confident that you're using accurate terminology backed by legal precedent." -publisher's description
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://apps.fastcase.com/PartnerBenefits/?IPKey=YqgsCx3zssdVGvBwDN%2bWkECjLVh6HJPUvW1vkc9Yupy1%2fXe8U%2fs2zNBjN1vWoaL0D4FAJvcGJrPFPMjrHFYNHTRYXRJsKrW1cwOm8ig3UPdj6asCU7XHbi2N3WlshdNF&LogoutUrl=https://www.sll.texas.gov&returnurl=https://fc7.fastcase.com/results?docUid=68468314
-
By Dannenberg, Ross. American Bar Association. 2;2017-03. 2017.
This authoritative handbook takes you through the legal morass of producing a video game, from the moment you get the original idea through publication. This practical, prescriptive book is an essential resource for legal professionals with clients in the area as well as for video game developers. Each chapter in this revised edition of Legal Guide to Video Game Development contains a general road map to one legal aspect of video game production: Patents, Copyright and Trademarks Business and Finance Issues Risk and Insurance Intellectual Property Agreements Licensing and Open Source Material EULAs and Terms of Use The Children's Online Privacy Protection Act Publishing Your Game Written by experienced lawyers who work closely with their software and video game developer clients, this is a guide to the process of taking an idea and creating a product, from beginning to end. Chapters include the relevant forms, agreements, and contracts for that phase of production, as well as numerous …
Read online: http://lexisdl.com/library/txsll/title/3212284
-
By Classen, H. Ward. American Bar Association. Seventh edition. 2022.
Primarily for intellectual property attorneys, this resource begins with software procurement procedures before moving on to the nuts and bolts of a software license. In addition to defining common terms, explaining boilerplate clauses, and going into service-level agreements and other related contracts, this e-book includes agreement form templates with helpful annotations.
URL: https://lexisdl.com/library/txsll/title/9196619
-
By Classen, H. Ward. American Bar Association. 6;2019-05. 2019.
Updated and expanded, the sixth edition of this valuable guide is an essential resource for lawyers who work with clients and conduct business transactions in this area. The latest edition includes new chapters on types of licenses, software development agreements, and software development kits and application program interfaces. New and updated model forms are available on an accompanying website that you can access to accompany the book allowing you to customize for your own practice needs.
Read online: http://lexisdl.com/library/txsll/title/4742250
-
By Tollen, David W. Third edition. 2021.
Now updated and expanded, this reference manual and training guide covers cloud computing agreements, software licenses, and other IT contracts. Written in a clear, plain-English, jargon-free style, this bestselling handbook is a complete resource for lawyers, contract managers, and anyone responsible for getting IT deals done. It's by David W. Tollen, one of the industry's leading authorities on technology contracts. Complete with negotiation tips, guidance on the business issues behind the terms, and sample contract language, the book covers all topics in technology contracts, including data privacy and security terms, warranties, indemnities, open source software, deconversion and transition, limitations of liability, SaaS escrows, copyright licensing, and service level agreements (SLAs). This third edition provides a greater focus on data: on clauses addressing rights in data, privacy, control of data, and data security—some of the key concerns in IT contracts today…
Read online: https://lexisdl.com/library/txsll/title/6439045
» All Titles
-
By Classen, H. Ward. American Bar Association. 6;2019-05. 2019.
Updated and expanded, the sixth edition of this valuable guide is an essential resource for lawyers who work with clients and conduct business transactions in this area. The latest edition includes new chapters on types of licenses, software development agreements, and software development kits and application program interfaces. New and updated model forms are available on an accompanying website that you can access to accompany the book allowing you to customize for your own practice needs.
Read online: http://lexisdl.com/library/txsll/title/4742250
-
Latest received: Automatic updates. By Harak, Charlie. National Consumer Law Center. Sixth edition. c2018-.
This is a treatise covering the laws and regulations of delivery of electricity, gas and telecommunications services.
Note: To view online, click on its title from the NCLC website homepage. Or click on “My NCLC” and browse for it by title.
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://library.nclc.org/my-nclc
Read online Detailed table of contents View details in library catalog
-
By Pearson, Mark. 2012.
Learn how to communicate online without crossing any legal boundaries.
Read online: https://lexisdl.com/library/txsll/title/1552541
-
By Shaw, Thomas J. American Bar Association. ;1. 2014.
The future is digital, centered on the Internet. Today's children must fully embrace the capabilities offered by the many technologies and services available on the Internet. But in doing so, children become exposed to significant risks. So parents, schools, organizations, and lawyers must understand these risks and how to safeguard children's experiences online. The Internet is both dynamic and global, requiring assessment of current and emerging risks and local and global laws. This important new book provides a practical and comprehensive approach to the experiences of children online, including the risks they encounter as active and passive participants with the Internet. It includes methodologies for analyzing national and international laws, best practices for assessing and treating the online risks to children and parents, and advice on how to get started. In short, it is a complete methodology for lawyers, parents, schools, and organizations interacting with children. This book…
Read online: http://lexisdl.com/library/txsll/title/1896048
-
By Scelsi, Chrissie. American Bar Association. 2;2019-02. 2019.
?The intersection between intellectual property law and video games and immersive entertainment is exciting, fast-paced, and complex, as technology evolves at breakneck speed and often outpaces established case law. Game developers routinely wrestle with all aspects of IP law and need counsel on end-user license agreements; ownership and challenges of user-generated content; the scope and limitations of copyright protection; remedies for trade secret appropriation; duration of right of publicity protection; approaches for simulating reality without running afoul of existing trademark and brand rights of real-world companies and people; ramifications of international law; and more. This new edition of Computer Games and Immersive Entertainment covers a broader range of topics and helps lawyers understand the ongoing changes, developing creative and nimble solutions to protect companies while still engaging the players.
Read online: http://lexisdl.com/library/txsll/title/4578038
-
By Jacobs, Thomas A. American Bar Association. ;2020-09. 2020.
Cyberbullying is the first pandemic of the twenty-first century. No country has escaped this phenomenon since the Internet became mainstream and litigation commenced in the 1990s. In fact, 2020 even witnessed cyber-abuse related to the novel coronavirus (COVID-19) as well as race relations and protests. Cyberbullying Law presents cases, comments, and legal research for attorneys, judges, and anyone interested in the rights and responsibilities of those involved in cyber abuse or harassment. Due to the ubiquity of all things digital, litigants invariably become enmeshed in electronic communication. This may lead to petitions for orders of protection or sua sponte orders from the bench regarding communication among parties, victims, and witnesses. Practitioners in civil and criminal courts, or family and juvenile courts regularly confront instances of cyber abuse, whether constituting harassment, intimidation, stalking or threats. First Amendment protections are not absolute, although …
Read online: http://lexisdl.com/library/txsll/title/5773524
-
By Kesan, Jay P. West Academic Publishing. First edition. 2019.
The reliance on technology and the internet during the COVID-19 pandemic has led to an increase in cybersecurity attacks. This Nutshell volume compiles information about state, federal, and international laws related to cybersecurity and data privacy.
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=26367
-
By Bandler, John T. American Bar Association. 1;2017-09. 2017.
Why this book? Most have neither considered, nor know how "cyber secure" they are. For the majority who are not information technology (IT) professionals, the idea of delving into the technical details of secure computing can create apprehension and confusion. Some people think that if their email system works, and if their documents are accessible, then why bother making any security improvements to their system, which might create complications or cost time and money. Some would prefer not to know the cybercrime risks they are facing, or just haven't thought about it. Cybersecurity is more, though; it is also about protecting data from risks other than cybercrime, such as unanticipated IT issues, hard-drive crashes, house fires, and other incidents. Beyond security, this book will also provide information to use computers and data more efficiently. No matter an individual's level of comfort or experience with computers, this book will help recognize when electronic "doors" are open …
Read online: http://lexisdl.com/library/txsll/title/3596015
-
By Mireles, Michael S. West Academic Publishing. First edition. 2021, c2022.
This book provides an overview of cybersecurity laws. It discusses state laws on student privacy and data breach notification, federal laws such as the Gramm-Leach-Bliley Act and the Health Insurance Portability and Accountability Act, and other topics including ransomware, hacking, and the Internet of Things.
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=27697
-
By Mableson, Connie J. American Bar Association. 2;2018-04. 2018.
The online environment is constantly evolving, and the case law and processes under the Digital Millennium Copyright Act (DMCA) are always changing to keep pace. The second edition of the DMCA Handbook provides a practical understanding of what online service providers (OSPs and ISPs), website owners, content creators, and copyright owners need to know to protect their respective online interests and enjoy immunity from infringement. This resource provides a quick-start guide for focusing on basic requirements to prepare and file the forms and notices relevant to specific pursuits. It also offers a more in-depth analysis of the DMCA process and case law for those who want additional background about the origins and operation of the DMCA regime. Inside the book and on its related website are essential DMCA forms and appendices, that include: Letter the OSP Promptly Sends to Alleged Infringer DMCA Take-Down Notice Sent by Copyright Owner to OSP (Fill-in or Automated) DMCA Designated …
Read online: http://lexisdl.com/library/txsll/title/3974601
-
Latest received: Automatic updates. By Battersby, Gregory J. Aspen Publishers. Second edition. c2010-.
This book contains best practices and example agreements for those who run a website or conduct commerce on the web.
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://apps.fastcase.com/PartnerBenefits/?IPKey=YqgsCx3zssdVGvBwDN%2bWkECjLVh6HJPUvW1vkc9Yupy1%2fXe8U%2fs2zNBjN1vWoaL0D4FAJvcGJrPFPMjrHFYNHTRYXRJsKrW1cwOm8ig3UPdj6asCU7XHbi2N3WlshdNF&LogoutUrl=https://www.sll.texas.gov&returnurl=https://fc7.fastcase.com/outline/TX/735?docUid=106700086
-
Latest received: Automatic updates. Aspen Law & Business. Fourth edition. 2002.
A practical guide to successful licensing strategies and techniques, this reference covers the gamut of license agreement issues, from valuation, intellectual property, and antitrust matters to tax and bankruptcy concerns. Each chapter is authored by one or more experts and provides detailed, practice-oriented analysis of key areas along with timesaving contract clauses and provisions.
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://apps.fastcase.com/PartnerBenefits/?IPKey=YqgsCx3zssdVGvBwDN%2bWkECjLVh6HJPUvW1vkc9Yupy1%2fXe8U%2fs2zNBjN1vWoaL0D4FAJvcGJrPFPMjrHFYNHTRYXRJsKrW1cwOm8ig3UPdj6asCU7XHbi2N3WlshdNF&LogoutUrl=https://www.sll.texas.gov&returnurl=https://fc7.fastcase.com/outline/TX/737?docUid=106766380
-
By Brummer, Chris. West Academic. First edition. 2019.
This title provides an overview of financial technology services and the rules that regulate them.
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=26685
-
By Rustad, Michael. West Academic Publishing. Fourth edition. 2021.
This timely and up-to-date Hornbook comprehensively examines topics such as Internet technologies, Internet governance, global consumer protection, cybertorts, Internet-related privacy, copyright, trademarks and domain names.
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=27638
-
By Rustad, Michael. West Academic Publishing. Fifth edition. 2021.
"Global Internet Law in a Nutshell presents a very timely overview of legal issues that arise from the World Wide Web. Topics include Internet-driven technologies such as Artificial Intelligence, Machine Learning Bitcoins, The Internet of Things, 3D Products Liability, and Driverless Cars. This edition emphasizes the legal and policy issues arising out of social media such as Twitter’s decision to permanently ban President Trump from its platform. The goal is to provide the reader with an up-to-date summary of the most important new cases and statutory developments. Each chapter provides the latest developments in Internet Law from the European Union such as the General Data Protection Regulation, which is setting a global standard for privacy and data protection. Each chapter has examples and explanations of Internet Law developments from around the world. This Nutshell provides global coverage of recurring Internet issues that lawyers and law students will encounter in practice. It a…
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=27462
-
By Isaza, John. American Bar Association. 1;2018-03. 2018.
Social media presents many dilemmas in the business and legal world. Given the global nature of corporate business, the use of social media compels U.S. lawyers with international clientele to have an understanding of both U.S. and other jurisdictions. Handbook on Global Social Media Law for Business Lawyers discusses social media laws and related governance principally in the United States, with an examination of key global regions including Canada, the European Union, Australia and Asia. To help you better understand the legal challenges and implications surrounding social media, domestically and internationally, this practical resource includes guidance on: Use of social media as a tool in recruitment of employees The effect of privacy on an employer's ability to govern its employees FTC's general social media disclosure guidelines Cybersecurity and risk, including hacking, theft of corporate details, data loss, data breach, and more Intellectual property issues in social media B…
Read online: http://lexisdl.com/library/txsll/title/3899442
-
By Gantt, Andrew. American Bar Association. 2021.
Maintaining cybersecurity in today's technologically driven world is vital to the health of any business. Media outlets continue to report on large-scale data breaches affecting millions of consumers' information and costing companies millions, and sometimes even billions, of dollars to rectify. Organizations, particularly those within or touching the healthcare industry, remain the most attractive of targets for cyber attackers given the higher and lasting value of personal health information. The goal of this book is to help bolster stakeholders' knowledge of cybersecurity in the healthcare industry, with the aim of pinpointing current and impending threats to the industry's data security. The topics to be addressed include types of cybersecurity threats; ransomware in healthcare; how to prepare for and respond to cybersecurity attacks; the cost of inadequate security measures; and managing privacy and cybersecurity risks.
URL: https://lexisdl.com/library/txsll/title/6439034
-
By Law, Section of Science and Technology. American Bar Association. 1;1. 2014.
Today more than ever, legal practitioners need to fully understand the obligations, liabilities, risks and treatments involving information security and privacy. Top executives must have a firm grasp of the information security and privacy statutes and regulations in each country where they do business, including any industry sector-specific rules. This book provides a practical and comprehensive approach to information security and privacy law for both international and domestic statutes. It provides all the tools you need to handle the business, legal and technical risks of protecting information on a global scale. For anyone responsible for or advising a corporation involved in domestic or international business, who must comply with a dizzying array of statutes, regulations, technologies, methodologies and standards, this book is the invaluable resource you've been looking for.
Read online: http://lexisdl.com/library/txsll/title/1744172
-
Latest received: Automatic updates. Aspen Law & Business. Tenth edition. [c2011?]-.
"Internet and Technology Law Desk Reference, Tenth Edition is the best reference to explain today's high-tech terms, legal doctrines, acronyms, and jargon, as the terms have been defined in court decisions, statutes, regulations, or industry usage. The Internet and Technology Law Desk Reference covers over 2,400 legal and technical terms - the most comprehensive listing of its kind. So you can advise clients, draft contracts, and litigate cases, confident that you're using accurate terminology backed by legal precedent." -publisher's description
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://apps.fastcase.com/PartnerBenefits/?IPKey=YqgsCx3zssdVGvBwDN%2bWkECjLVh6HJPUvW1vkc9Yupy1%2fXe8U%2fs2zNBjN1vWoaL0D4FAJvcGJrPFPMjrHFYNHTRYXRJsKrW1cwOm8ig3UPdj6asCU7XHbi2N3WlshdNF&LogoutUrl=https://www.sll.texas.gov&returnurl=https://fc7.fastcase.com/results?docUid=68468314
-
By Borger, John P. American Bar Association. 1;1. 2014.
If your company or your clients have a website you need this book. The ever changing digital landscape is a tricky place for legal practitioners and not understanding the rules of the game can cost your client dearly. Google/Youtube has spent over $100 Million defending against Viacom s $1 Billion copyright lawsuit. A judge ruled that the AFP and Getty Images must pay photographer Daniel Morel $1.02 Million in damages for using and distributing his Twitter photos of the earthquake in Haiti. A Connecticut ambulance company paid a former employee to settle a wrongful termination claim after she was fired for criticizing her boss on Facebook. This handy guide is a practical, usable and accessible tool for those with general legal knowledge who do not encounter this area of law regularly. It explores a wide range of legal issues facing anyone or any company with an online presence: defamation, invasion of privacy, copyright infringement, website terms of use, and employer s rights and ri…
Read online: http://lexisdl.com/library/txsll/title/1880581
-
By Spernow, Bill. American Bar Association. 1;2017-05. 2017.
Law firms can mitigate the risk of a data breach through a variety of means, including: investing in cybersecurity tools, hiring internal and external cyber resources to augment the firm's current information security practices, and arguably most importantly changing the firm's culture to be more security conscious. No one size fits all solution exists for dealing with cyber threats, but with proper focus and resources, a firm can consider its unique factors and develop an information security posture that addresses its most compelling concerns. While preventing a breach should be a paramount concern for any law firm, it is similarly important to prepare for what happens in the event that a breach occurs. Although there are options, such as cyber insurance, to help mitigate the direct costs of a breach, law firms must also look to other options to resolve these issues expeditiously. As the costs associated with litigating data breach claims continues to climb, it will become increasing…
Read online: http://lexisdl.com/library/txsll/title/3293631
-
Latest received: Automatic updates. By Delta, George B. Aspen Publishers. Fourth edition. [2018?]-.
"This up-to-date legal resource covers electronic commerce and online contracts, privacy and network security, intellectual property and online content management, secure electronic transactions, cryptography, and digital signatures, protecting intellectual property online through link licenses, frame control and other methods, online financial services and securities transactions, antitrust and other liability." -publisher's description
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://apps.fastcase.com/PartnerBenefits/?IPKey=YqgsCx3zssdVGvBwDN%2bWkECjLVh6HJPUvW1vkc9Yupy1%2fXe8U%2fs2zNBjN1vWoaL0D4FAJvcGJrPFPMjrHFYNHTRYXRJsKrW1cwOm8ig3UPdj6asCU7XHbi2N3WlshdNF&LogoutUrl=https://www.sll.texas.gov&returnurl=https://fc7.fastcase.com/outline/TX/735?docUid=171725224
-
By Jacobowitz, Jan L. American Bar Association. 1;2017-09. 2017.
As social media is inescapable, it's essential for attorneys to understand how to interact with it ethically. This handbook provides guidance for ethical "digital competence" - both when representing clients and when managing your practice's social media presence.
Read online: https://lexisdl.com/library/txsll/title/3596021
-
By Dannenberg, Ross. American Bar Association. 2;2017-03. 2017.
This authoritative handbook takes you through the legal morass of producing a video game, from the moment you get the original idea through publication. This practical, prescriptive book is an essential resource for legal professionals with clients in the area as well as for video game developers. Each chapter in this revised edition of Legal Guide to Video Game Development contains a general road map to one legal aspect of video game production: Patents, Copyright and Trademarks Business and Finance Issues Risk and Insurance Intellectual Property Agreements Licensing and Open Source Material EULAs and Terms of Use The Children's Online Privacy Protection Act Publishing Your Game Written by experienced lawyers who work closely with their software and video game developer clients, this is a guide to the process of taking an idea and creating a product, from beginning to end. Chapters include the relevant forms, agreements, and contracts for that phase of production, as well as numerous …
Read online: http://lexisdl.com/library/txsll/title/3212284
-
By Kennedy, Dennis. American Bar Association. 2;2. 2014.
This bestselling ABA book has been fully revised and updated to reflect significant changes to LinkedIn's layout and functionality made through 2013.
Read online: http://lexisdl.com/library/txsll/title/1880600
-
By Halpert, Marc W. American Bar Association. 1;2017-8. 2017.
Hundreds of millions of businesspeople use LinkedIn daily, not only to forge connections and nurture relationships, but also to search, assess, and choose reliable professionals. Understanding how best to use LinkedIn will give you an edge in tapping into LinkedIn's remarkable power to promote and connect your expertise. There are many books on LinkedIn that focus on "what to do," but not on the strategy of "why and how" to make LinkedIn a pivotal tool in the professional' marketing toolbox. Many "what to do," books are almost immediately are out of synch with the latest iteration of LinkedIn before they are even published. And with the latest changes to the LinkedIn user interface in March 2017, this book is up-to-date and relevant while the others are teaching what to do with the old interface. What remains constant, however, is the way each law firm, and for that matter, any sort of professional practice, expresses "why you do what you do" and "how well others say you do it." This b…
Read online: http://lexisdl.com/library/txsll/title/3444817
-
By Nelson, Sharon D. American Bar Association. 1;2016-06. 2016.
In the four years since the initial publication of Locked Down, data security has exploded as a concern for law firms. At the time, many attorneys were not paying attention to data security. But with the growing number of data breaches, no attorney can afford to ignore these developments. With quickly advancing technology to prevent, detect and respond to intrusions and ever-evolving threats, keeping up on the latest information you need to protect your confidential data can be a daunting task. The second edition of Locked Down is the answer to this challenge. Authors Sharon D. Nelson, David G. Ries, and John W. Simek are recognized experts in cybersecurity, and their lectures draw standing-room-only crowds. They give you the data security basics you need in simple, easy-to-understand language. You can manage your risk by following the practical advice provided in this book.
Read online: http://lexisdl.com/library/txsll/title/2821678
-
By Carter, T. Barton. West Academic Publishing. Eighth edition. 2020.
"Mass Communication Law in a Nutshell satisfies the need for a basic text in communication law, not only for law students but for journalism and communication students as well. Highlights of the Eighth Edition of the popular book include a discussion of Hulk Hogan’s successful lawsuit against Gawker for public disclosure of private facts, the right to be forgotten (or “erased”) in Europe, and numerous social media issues, including cyberstalking, catfishing, trolling, doxing, swatting, posting threats on Facebook and access to President Trump’s tweets. Further highlights include the USA FREEDOM Act, the Supreme Court’s expansion of exemption 4 of FOIA, First Amendment limits on denials of trademark registration, the Broadcast Spectrum Auction, and the continuing battle over net neutrality." - publisher's description
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=26766
-
By Mireles, Michael. West Academic Publishing. Second edition. 2024.
"This book is for cybersecurity and privacy professionals, cybersecurity and privacy lawyers, law students, and anyone interested in learning the cybersecurity laws that apply to an entity based on the entity’s business model(s) and data collection model(s). For example, what is the applicable Securities and Exchange Commission (SEC) cybersecurity law if an entity provides an alternate trading platform (ATP) with a daily trading volume of 50,000? The authors combine years of technical and legal experience in providing a map for cybersecurity counseling based on an understanding of the CISO’s technical cybersecurity issues and how they fit into today’s cybersecurity law challenges. The authors explain the difference and overlap between privacy law, cybersecurity law, and cybersecurity. Those interested in speaking the same cybersecurity language as a Chief Information Security Officer (CISO) will benefit. The first chapter provides a review of cybersecurity. For example, key to any disc…
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=28367
-
By Soma, John T. West Academic Publishing. Second edition. 2014.
"The Privacy Nutshell briefly reviews the historical roots of privacy, and then examines each of these U.S. privacy statutes and regulations. Virtually all governments and businesses face privacy considerations as technology continues to evolve. Legal issues related to privacy are exploding on the U.S. legal scene. The EU has a long history of a strong regulatory privacy regime. The U. S., however, follows a sectoral approach to privacy, whereby Congress responds to each privacy “crisis” with a new statute and set of regulations. This sectoral approach has resulted in a unique series of privacy rules for different areas of society. The Privacy Nutshell is an excellent introductory guide to the legal privacy world." -publisher's description
URL: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=23394
-
By Serwin, Andrew B. American Bar Association. 1;1. 2014.
Information security and privacy issues are not new, but mass attention and compliance efforts are at an all-time high, and are increasing as litigation and high-profile security breaches continue to draw attention. Current hot topics in information security and privacy include pretexting; financial privacy; privacy litigation; outsourcing to foreign countries; electronic health and personal records; and social networking. With these issues, a large number of laws have been passed to regulate the information security and privacy issues. Compliance with these laws is a legal reality as well as a business necessity. Privacy, Security and Information Management will help you decipher that laws that regulate these issues and help your clients and business comply with the requirements to avoid security and privacy breaches. Topics covered include internet privacy, financial privacy, unauthorized access to networks and information, wiretapping and privacy in electronic communications, iden…
Read online: http://lexisdl.com/library/txsll/title/1744216
-
By Black, Nicole. American Bar Association. 1;1. 2014.
The world of legal marketing has changed with the rise of social media sites such as Linkedin, Twitter, and Facebook. Law firms are seeking their companies attention with tweets, videos, blog posts, pictures, and online content. Social media is fast and delivers news at record pace. Social Media for Lawyers: The Next Frontier provides you with a practical, goal-centric approach to using social media in your law practice that will enable you to identify social media platforms and tools that fit your practice and implement them easily, efficiently, and ethically. Beginning with a brief historic overview of social media, this guide describes the current trends and statistics on current use, as well as explains why social media is important for lawyers, and busts some of the myths that deter lawyers from engaging in social media. Included are: • descriptions and screen shots of various social media platforms and step-by-by advice on setting up a profile • …
Read online: http://lexisdl.com/library/txsll/title/1744218
-
By Garcia, Ryan. West Academic Publishing. Second edition. 2022.
"Social media has transformed how the world communicates. Its impact has been felt in every corner of our society including the law. Social Media Law in a Nutshell is a wide-ranging look of how the social media transformation has impacted various legal fields. From marketing to employment to torts to criminal law to copyright and beyond, virtually every legal field has been changed by social media. By looking at high level concerns and example cases, Social Media Law in a Nutshell attempts to give practitioners exposure to social media issues and concerns so they can better advise clients and approach the new social media world with their legal eyes opened to new and old risks alike. This book can also serve as a text for law professors looking to expose law students to the burgeoning area of Social Media Law." - publisher's description
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://subscription.westacademic.com/Book/Detail?id=27782
-
By Hudson, David L. Greenwood. Third edition. [2015].
A book that covers the legal rights of young adults in all aspects of their daily lives such as at home, at school and on the job. The third edition includes information on emerging topics such as cyber-bulling and sexting as well as recent changes to laws on privacy and LGBTQ rights.
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://go.gale.com/ps/i.do?p=GVRL&sw=w&u=aust34807&v=2.1&it=aboutBook&id=GALE%7C8NOZ&sid=bookmark-GVRL
-
By Section of Antitrust Law of the American Bar Association. American Bar Association. 3;2020-04. 2020.
The Telecom Antitrust Handbook, Third Edition is intended to serve as a comprehensive review and analysis of the application of antitrust law and principles to the telecommunications industries (including wireline and wireless telecom, broadband access, and video programming distribution) for use by telecom and antitrust counsel in evaluating the many competitive issues that arise in the telecom markets. The book guides the reader through the fundamental economic underpinnings of communications networks that make substantive analysis of antitrust issues in these sectors both unique and challenging (Chapter I), and then transitions to a discussion of the history of regulation and monopolization issues in the industry (Chapter II), restraints of trade (Chapter III), joint ventures (Chapter IV), mergers (Chapter V), immunity issues (Chapter VI), and finally an overview of consumer protection issues (Chapter VII), including the evolving regulation of consumer privacy.
Read online: http://lexisdl.com/library/txsll/title/5433219
-
By Rhodes, Jill D. American Bar Association. Third edition. 2022.
The ABA Cybersecurity Handbook: A Resource for Attorneys, Law Firms and Business Professionals, Second Edition is published by the ABA Cybersecurity Legal Task Force which is composed of ABA members with expertise in cybersecurity as well as government, technical and private sector representation. The Second Edition of this top selling cybersecurity book is a must read for anyone working in the field including private practice attorneys and associates, in-house counsel, non-profit and government attorneys and others. Since the release of the first edition published in 2013, cybersecurity breaches in law firms have made news headlines and clients are asking questions about lawyers' and firms' security programs. From the massive Panama Papers breach that led to the dissolution of the Mossack Fonseca Law Firm in April 2016 to the WannaCry and Petya Ransomware attacks, the latter that led to the several day work outage at DLA Piper in June 2017, it is imperative that attorneys understan…
Read online: https://lexisdl.com/library/txsll/title/3899456
-
By Rhodes, Jill D. American Bar Association. Third edition. 2018.
This third edition of The ABA Cybersecurity Handbook updates and expands upon the issues raised in the first two editions. The cybersecurity landscape has undergone seismic changes since the publication of the second edition in 2017. The COVID-19 pandemic has brought new levels of technology integration to the practice of law, accompanied by new and expanded cybersecurity risks. Beyond the legal profession, the SolarWinds, Kaseya, and Colonial Pipeline breaches have set new and alarming precedents. Heightened cybersecurity risk worldwide has prompted increased responses from the US federal government and from the international community. Amid these ongoing developments, the Handbook is at your fingertips as a guide to preparing for and responding to cybersecurity threats and incidents. The foundational information it shares will remain relevant even in a changing environment. The recommendations within each chapter, located at the end, provide an easy guide for developing and imple…
URL: https://lexisdl.com/library/txsll/title/3899456
-
By Robinson, Nicholas A. RAND Corporation. 2011.
This report discusses how policy-makers might address the challenges and risks in respect of the security, privacy and trust aspects of cloud computing that could undermine the attainment of broader economic and societal objectives across Europe.
Read online: https://lexisdl.com/library/txsll/title/680165
-
Latest received: Automatic updates. Aspen Law & Business. c2000-.
The Computer & Internet Lawyer provides action-oriented guidance by nationally known computer lawyers to resolve the problems that face manufacturers, developers, distributors, and users of computer, telecommunication and online products and services.
Read online: https://ezproxy.sll.texas.gov:2443/login?url=https://apps.fastcase.com/PartnerBenefits/?IPKey=YqgsCx3zssdVGvBwDN%2bWkECjLVh6HJPUvW1vkc9Yupy1%2fXe8U%2fs2zNBjN1vWoaL0D4FAJvcGJrPFPMjrHFYNHTRYXRJsKrW1cwOm8ig3UPdj6asCU7XHbi2N3WlshdNF&LogoutUrl=https://www.sll.texas.gov&returnurl=https://fc7.fastcase.com/outline/TX/735?docUid=253711141
-
By Cwik, Cynthia H. American Bar Association. 1;2019-05. 2019.
The Internet of Things encompasses the ability to connect and direct almost any kind of mechanical system, whether it's automotive, medical, residential, or critical infrastructure. IoT technologies hold tremendous promise for our communities by making them safer and more efficient. As with any other technology, they also entail security risk, and the risks associated with IoT technologies must be aggressively managed. We can do so, with industry's help, by working to leverage standards and liability and insurance mechanisms to ensure that IoT's foundational building blocks are secure and effective. Increasingly, utilities are deploying smart grid technologies, wirelessly connecting thermostats to the utility to measure usage patterns and allow energy supplies to be adjusted, with precision based on need. Companies are working on clocks, kitchen appliances, and other household products that monitor consumer behavior to turn on your coffee machine moments before you wake up; warn you wh…
Read online: http://lexisdl.com/library/txsll/title/4742306
-
By Classen, H. Ward. American Bar Association. Seventh edition. 2022.
Primarily for intellectual property attorneys, this resource begins with software procurement procedures before moving on to the nuts and bolts of a software license. In addition to defining common terms, explaining boilerplate clauses, and going into service-level agreements and other related contracts, this e-book includes agreement form templates with helpful annotations.
URL: https://lexisdl.com/library/txsll/title/9196619
-
By Tollen, David W. Third edition. 2021.
Now updated and expanded, this reference manual and training guide covers cloud computing agreements, software licenses, and other IT contracts. Written in a clear, plain-English, jargon-free style, this bestselling handbook is a complete resource for lawyers, contract managers, and anyone responsible for getting IT deals done. It's by David W. Tollen, one of the industry's leading authorities on technology contracts. Complete with negotiation tips, guidance on the business issues behind the terms, and sample contract language, the book covers all topics in technology contracts, including data privacy and security terms, warranties, indemnities, open source software, deconversion and transition, limitations of liability, SaaS escrows, copyright licensing, and service level agreements (SLAs). This third edition provides a greater focus on data: on clauses addressing rights in data, privacy, control of data, and data security—some of the key concerns in IT contracts today…
Read online: https://lexisdl.com/library/txsll/title/6439045