{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:00:43Z","timestamp":1754157643120,"version":"3.41.2"},"reference-count":0,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2000,5,1]],"date-time":"2000-05-01T00:00:00Z","timestamp":957139200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000,5,1]]},"abstract":"<jats:p>The exploding use of the Internet for everyday communication is bringing new threats to companies \u2013 revelation of trade secrets, discrimination, harassment, copyright infringement, negligence, libel, and slander, etc. The threat to companies is real. Lawyers can seek information in electronic records, including e\u2010mail, on litigation or criminal cases. This paper gives an overview of where the risks lie, and what the IT managers should do to minimize the risk.<\/jats:p>","DOI":"10.1108\/09685220010321335","type":"journal-article","created":{"date-parts":[[2007,4,13]],"date-time":"2007-04-13T10:09:50Z","timestamp":1176458990000},"page":"98-100","source":"Crossref","is-referenced-by-count":6,"title":["Managing legal liability of the Net: a ten step guide for IT managers"],"prefix":"10.1108","volume":"8","author":[{"given":"Mohsen","family":"Attaran","sequence":"first","affiliation":[]}],"member":"140","container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220010321335","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220010321335\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/09685220010321335\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:08:31Z","timestamp":1753402111000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/8\/2\/98-100\/175193"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,5,1]]},"references-count":0,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2000,5,1]]}},"alternative-id":["10.1108\/09685220010321335"],"URL":"https:\/\/doi.org\/10.1108\/09685220010321335","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2000,5,1]]}}}