Features

5 Expert Cybersecurity Steps to Take in 2024
As many CISOs and cyber teams think about the year ahead, and legal professionals consider the far-reaching consequences of cybersecurity, here is a checklist to help them prepare for the biggest cybersecurity trends to come.
Features

Pennsylvania Court Hit With Cyberattack, But It Had a Plan
Law firms have information that hackers want — Social Security numbers, financial data, personally identifiable information and more. It is therefore essential that firms plan for a possible breach. And when the breach occurs, have a plan.
Features

FTC's 'Click to Cancel' Rule Could Cost $2.7 Billion for Businesses
The FTC's proposed click to cancel rule amendments would impose a one-time cost of $2.7 billion on businesses and have an annual effect on the national economy of at least $100 million, according to an economic report by the online advertising industry's association.
Features

All the News That's Fit to Pinch: 'NYT v. OpenAI'
The emerging cases by authors and copyright owners challenging various generative AI programs for using copyrighted materials are certain to create new troubles for the courts being asked to apply the fair use doctrine to this important new technology.
Features

To Benefit from Cyber Insurance Coverage in France, Don't Forget to File a Complaint
Since April 2023, French regulation makes the payment of insurance compensation in case of cyberattacks conditional on the filing of a complaint within a reduced time frame. This regulation has been enacted in the context of the French government decision to fight against the resurgence of cyberattacks, together with ransom demands, which have a significant impact on the economy.
Features

Artificial Intelligence: A New Weapon of Insider Threats
In the hands of a motivated insider with only average technical proficiency, AI becomes a uniquely effective tool with which to penetrate an organization's complete security infrastructure for any number of malicious purposes.
Features

'Keyword Warrants' Pose Privacy Threat
The practice of seeking a "keyword warrant" is a technique of dragnet policing. A keyword warrant requires the production of all IP addresses for anyone who inputs a particular word or phrase into an internet search engine. The search results are then used to identify a device user.
Features

FTC Revises Children's Online Privacy Rule to Extend Parental Consent to Targeted Advertising
The Federal Trade Commission in January provided more details on its proposed changes to the Children's Online Privacy Protection Rule, underscoring the need for online operators to review and prepare to update their policies and procedures.
Features

Third Circuit to Rule on TikTok's Section 230 Immunity After Viral Stunt Turned Fatal
The U.S. Court of Appeals for the Third Circuit has been asked to decide whether TikTok's "highly personalized" algorithm that feeds videos to users is considered first-party speech not immune from civil liability by Section 230 of the federal Communications Decency Act.
Features

The EU AI Act Will Transform Practices for AI Governance In the U.S.
The EU AI Act solidifies one of the world's first comprehensive attempts to bring governance to unlock innovation in AI. U.S. companies have asked, what exactly does this development mean for their businesses?
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Artist Challenges Copyright Office Refusal to Register Award-Winning AI-Assisted WorkCopyright law has long struggled to keep pace with advances in technology, and the debate around the copyrightability of AI-assisted works is no exception. At issue is the human authorship requirement: the principle that a work must have a human author to be eligible for copyright protection. While the Copyright Office has previously cited this "bedrock requirement of copyright" to reject registrations, recent decisions have focused on the role of human authorship in the context of AI.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Sender Beware: Jurisdictional Risks of Pre-Litigation CommunicationsThe Federal Circuit recently clarified — and lowered — the threshold to exercise specific personal jurisdiction over an out of state declaratory judgment defendant.Read More ›
- Beach Boys Songs Written Decades Ago Triggered Current Quarrel With LawyersThere's current litigation in the ongoing Beach Boys litigation saga. A lawsuit filed in 2019 against Nevada residents Mike Love and his wife Jacquelyne in the U.S. District Court for the District of Nevada that alleges inaccurate payment by the Loves under the retainer agreement and seeks $84.5 million in damages.Read More ›
- Supreme Court Rules Rejection of Trademark License Does Not Rescind Rights of LicenseeMission Product Holdings, Inc. v. Tempnology, LLC The question is whether a debtor's rejection of its agreement granting a license "terminates rights of the licensee that would survive the licensor's breach under applicable nonbankruptcy law."Read More ›