Features

Pennsylvania Court Hit With Cyberattack, But It Had a Plan
Law firms have information that hackers want — Social Security numbers, financial data, personally identifiable information and more. It is therefore essential that firms plan for a possible breach. And when the breach occurs, have a plan.
Features

FTC's 'Click to Cancel' Rule Could Cost $2.7 Billion for Businesses
The FTC's proposed click to cancel rule amendments would impose a one-time cost of $2.7 billion on businesses and have an annual effect on the national economy of at least $100 million, according to an economic report by the online advertising industry's association.
Features

All the News That's Fit to Pinch: 'NYT v. OpenAI'
The emerging cases by authors and copyright owners challenging various generative AI programs for using copyrighted materials are certain to create new troubles for the courts being asked to apply the fair use doctrine to this important new technology.
Features

To Benefit from Cyber Insurance Coverage in France, Don't Forget to File a Complaint
Since April 2023, French regulation makes the payment of insurance compensation in case of cyberattacks conditional on the filing of a complaint within a reduced time frame. This regulation has been enacted in the context of the French government decision to fight against the resurgence of cyberattacks, together with ransom demands, which have a significant impact on the economy.
Features

Artificial Intelligence: A New Weapon of Insider Threats
In the hands of a motivated insider with only average technical proficiency, AI becomes a uniquely effective tool with which to penetrate an organization's complete security infrastructure for any number of malicious purposes.
Features

'Keyword Warrants' Pose Privacy Threat
The practice of seeking a "keyword warrant" is a technique of dragnet policing. A keyword warrant requires the production of all IP addresses for anyone who inputs a particular word or phrase into an internet search engine. The search results are then used to identify a device user.
Features

FTC Revises Children's Online Privacy Rule to Extend Parental Consent to Targeted Advertising
The Federal Trade Commission in January provided more details on its proposed changes to the Children's Online Privacy Protection Rule, underscoring the need for online operators to review and prepare to update their policies and procedures.
Features

Third Circuit to Rule on TikTok's Section 230 Immunity After Viral Stunt Turned Fatal
The U.S. Court of Appeals for the Third Circuit has been asked to decide whether TikTok's "highly personalized" algorithm that feeds videos to users is considered first-party speech not immune from civil liability by Section 230 of the federal Communications Decency Act.
Features

The EU AI Act Will Transform Practices for AI Governance In the U.S.
The EU AI Act solidifies one of the world's first comprehensive attempts to bring governance to unlock innovation in AI. U.S. companies have asked, what exactly does this development mean for their businesses?
Features

The Indispensable Role of Litigation Analytics in Modern Class Action Practice
The need for precise, accurate, and comprehensive data analysis is paramount in class action litigation, where the stakes are high and the complexities manifold. At the heart of this change is the rising tide of litigation analytics.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- When Is a Repair Structural or Nonstructural Under a Commercial Lease?A common question that commercial landlords and tenants face is which of them is responsible for a repair to the subject premises. These disputes often center on whether the repair is "structural" or "nonstructural."Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- The Cost of Making PartnerMaking partner isn't cheap, and the cost is more than just the years of hard work and stress that associates put in as they reach for the brass ring.Read More ›