Features

TikTok’s ‘Blackout Challenge’ and Section 230 Immunity
In Anderson v. TikTok, Inc., the Third Circuit held that the liability of an Internet Service Provider such as TikTok depended on whether TikTok was sharing content via the platform’s algorithm or engaged in something more. The question of whether TikTok’s recommendation algorithm transformed content into TikTok’s own expressive activity was not immunized by Section 230 and has disrupted the protection previously enjoyed by Internet platforms like TikTok.
Features

Florida’s Digital Bill of Rights Joins the Regulatory Framework
The proliferation of data breaches and increased sophistication of criminal attack vectors has led more states to enact their own reasonable security provisions as part of the patchwork quilt of privacy laws. Nineteen of the U.S. states which have enacted comprehensive privacy laws along with Florida’s Digital Bill of Rights (which took effect summer 2024) have provisions requiring controllers and businesses to establish, implement and maintain reasonable administrative, technical and physical data security practices to protect the confidentiality, integrity and accessibility of personal data.
Features

DOJ Issues New Rule Regulating Handling of Bulk Sensitive Personal Data
The DOJ has proposed a rule that would regulate certain transactions involving bulk sensitive personal data. The rule would implement a complex regulatory framework, with civil and criminal enforcement, that is similar to sanctions and export licensing regimes. It also implicates federal cybersecurity requirements, government contracting and CFIUS actions.
Features

Second Circuit Clarifies Video Privacy Protection Act
The Second Circuit’s decision is notable in that it signals a reversal of the recent trend of dismissals of VPPA claims in courts across the country and could trigger a significant increase in VPPA lawsuits. Although organizations have grappled with VPPA claims for several years, this decision is another red flag to organizations to take immediate steps and ensure compliance with privacy laws to mitigate the risks of VPPA claims.
Features

4 Steps to Safeguard Against Individual Liability for Data Security Failures
With cyberattacks on the rise and class actions arising from cyberattacks being filed at an increased rate, executives and board members increasingly face the risk of being individually targeted in lawsuits brought by class action plaintiffs and governmental bodies alleging individual liability for data security failures.
Features

NY Revised Cybersecurity Regulation Goes Into Effect: What You Need to Know
On November 1, significant revisions to the regulations enforced by the New York Department of Financial Services (DFS) — the state’s financial services regulator — went into effect. The DFS revisions create a long-arm provision in that the changes affect not only New York State companies, but also their affiliates, and therefore the revisions could have an impact far beyond New York State borders.
Features

Most Companies Don’t Honor Privacy Opt-Outs
Global privacy control lets computer users set privacy preferences in their browsers, automatically sharing those choices whenever users go to a site. It’s supposed to give individuals more control over their personal data, allowing them to opt in or out of cookie usage, data sharing, data selling and targeted advertising.But they only work if companies honor them. And in most instances, they don’t.
Features

Federal Judge Allows Public Nuisance Claims Against Social Media Sites to Go Forward
Social media took another hit Nov. 15 after a federal judge allowed most of the public nuisance claims brought by school districts in the addiction cases to move forward.
Features

The 2024 LTN Law Firm Tech Survey
The 2024 LTN Law Firm Tech Survey spoke with 30 technologists at top U.S. law firms to get a sense of what technology issues they faced over the past year, how their technology posture, policies and investments are changing, and their thoughts on technology’s impact on the future of the legal industry.
Features

Untangling the Costs of Cyber Breach Recovery (and Strategies to Avoid Overbilling)
As cyber threats (and their price tags) evolve, so must the strategies companies use to navigate breach recovery. The future of breach recovery lies in smarter, faster solutions — particularly AI-driven approaches that streamline data mining and ensure breach notification compliance without compromising security or inflating costs.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- The Anti-Assignment Override ProvisionsUCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›