Features

Deep Fake of CFO on Videocall Used to Defraud Company of $25M
Hackers are using AI to sift large digital data to identify more convincing approaches for their scams as well as weaknesses in weaknesses in software coding or network security.
Features

5 Expert Cybersecurity Steps to Take in 2024
As many CISOs and cyber teams think about the year ahead, and legal professionals consider the far-reaching consequences of cybersecurity, here is a checklist to help them prepare for the biggest cybersecurity trends to come.
Features

Pennsylvania Court Hit With Cyberattack, But It Had a Plan
Law firms have information that hackers want — Social Security numbers, financial data, personally identifiable information and more. It is therefore essential that firms plan for a possible breach. And when the breach occurs, have a plan.
Features

FTC's 'Click to Cancel' Rule Could Cost $2.7 Billion for Businesses
The FTC's proposed click to cancel rule amendments would impose a one-time cost of $2.7 billion on businesses and have an annual effect on the national economy of at least $100 million, according to an economic report by the online advertising industry's association.
Features

All the News That's Fit to Pinch: 'NYT v. OpenAI'
The emerging cases by authors and copyright owners challenging various generative AI programs for using copyrighted materials are certain to create new troubles for the courts being asked to apply the fair use doctrine to this important new technology.
Features

To Benefit from Cyber Insurance Coverage in France, Don't Forget to File a Complaint
Since April 2023, French regulation makes the payment of insurance compensation in case of cyberattacks conditional on the filing of a complaint within a reduced time frame. This regulation has been enacted in the context of the French government decision to fight against the resurgence of cyberattacks, together with ransom demands, which have a significant impact on the economy.
Features

Artificial Intelligence: A New Weapon of Insider Threats
In the hands of a motivated insider with only average technical proficiency, AI becomes a uniquely effective tool with which to penetrate an organization's complete security infrastructure for any number of malicious purposes.
Features

'Keyword Warrants' Pose Privacy Threat
The practice of seeking a "keyword warrant" is a technique of dragnet policing. A keyword warrant requires the production of all IP addresses for anyone who inputs a particular word or phrase into an internet search engine. The search results are then used to identify a device user.
Features

FTC Revises Children's Online Privacy Rule to Extend Parental Consent to Targeted Advertising
The Federal Trade Commission in January provided more details on its proposed changes to the Children's Online Privacy Protection Rule, underscoring the need for online operators to review and prepare to update their policies and procedures.
Features

Third Circuit to Rule on TikTok's Section 230 Immunity After Viral Stunt Turned Fatal
The U.S. Court of Appeals for the Third Circuit has been asked to decide whether TikTok's "highly personalized" algorithm that feeds videos to users is considered first-party speech not immune from civil liability by Section 230 of the federal Communications Decency Act.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- Risks of “Baseball Arbitration” in Resolving Real Estate Disputes“Baseball arbitration” refers to the process used in Major League Baseball in which if an eligible player's representative and the club ownership cannot reach a compensation agreement through negotiation, each party enters a final submission and during a formal hearing each side — player and management — presents its case and then the designated panel of arbitrators chooses one of the salary bids with no other result being allowed. This method has become increasingly popular even beyond the sport of baseball.Read More ›
- Private Equity Valuation: A Significant DecisionInsiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity LitigationWhile the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.Read More ›