Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Among the ways social media platforms have tried to distinguish notable account holders such as celebrities, public figures, and brand names from impostors and inspire trust on their platforms, the blue checkmark appears to be most popular. Social media platforms have traditionally recognized such accounts by adding the blue checkmark next to the handles once the platforms have verified the authenticity of the accounts. However, the recent flurry of online impersonators, ranging from accounts posing as President Joe Biden to the pharmaceutical company Eli Lilly, exposes the challenges of social media platforms’ verification and authentication processes. Indeed, Twitter recently altered course with the “Twitter Blue” program, which is an “opt-in, paid monthly subscription that adds a blue checkmark to [an] account ….” Soon thereafter were reports of an increase in impersonation on the platform, with accounts purportedly owned by companies and public figures posting misleading or false content. These recent events show that monitoring and policing trademark infringements and right of publicity violations can be increasingly difficult in the social media context.
Continue reading by getting
started with a subscription.
China Finalizes New Regulations to Relax Personal Data Exports from China
By Lindsay Zhu, Scott Warren, Haowen Xu and Charmian Aw
Nearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.
The Perfect Storm: Why Contract Hiring In Privacy Will Eclipse Direct Hiring In 2024
By Jared Coseglia
With significantly fewer fully remote positions available in 2023, active job seekers were faced with the question of whether to begin considering compromises on work-from-home flexibility or compromise in other areas like compensation, vertical mobility, quality of life, or employment modality.
Lessons for CISOs from the SolarWinds Breach and SEC Enforcement
By Daniel Garrie, David Cass and Jennifer Deutsch
In an era where digital threats loom large, the responsibilities of Chief Information Security Officers have expanded beyond traditional IT security to encompass a broader governance, risk management, and compliance role. The infamous SolarWinds Corp. attack illustrates the complex cybersecurity landscape CISOs navigate.
A Roadmap for Implementing Information Governance In Law Firms
By Gregg Parker
In today's digital age, the volume of data generated and managed by law firms has skyrocketed, presenting both opportunities and challenges. Unfortunately, in parallel with this exponential growth in data, and partially as a direct result of it, law firms have also experienced a significant increase in targeted cyberattacks.