Features

Pitfalls In Personal Device Data Collection
The increasing frequency of "bring your own device" policies creates serious implications for subpoena recipients and litigants to ensure compliance with discovery demands. And courts across the country consider such personal mobile data fair game. To avoid pitfalls —and sanctions — counsel must take proactive steps to ensure proper preservation and collection of personal mobile data and verify that clients comply.
Features

Washington My Health My Data Act FAQs: Data Subject Rights
Like so many other features of the MHMDA, data subject rights are deceptively complicated and have the potential to create significant administrative hurdles to getting it right. In this article, we examine the tricky issues in our MHMDA FAQs and take a deep dive into data subject rights.
Features

Programmers Liability for Alleged Rights Violations Caused By AI Software
AI is designed to accomplish goals specified by and receive directions from a human being. Thus, it has been suggested that either direct or vicarious liability may be applied to hold the human programmer who wrote the software algorithms liable for the damages caused by the AI agent.
Features

Determining Ownership Rights of Social Media Accounts
This article provides guidance on the standards courts apply in determining ownership rights over social media accounts, as well as best practices to head off such disputes before they occur.
Features

What Employers Need to Know About Employee Privacy
Many employers struggle with not only identifying what is private protectable information, but also how to safeguard that information while also protecting the company's own business interests. Given the increased costs of litigation, it is critical that employers understand their obligations under the law and how to strike a legally compliant balance between these competing interests.
Features

Law Firms' Pressing AI Questions
Most of the legal industry has by now boarded the generative artificial intelligence train, filling up conference sessions dedicated to the topic, testing new legal technology solutions and exploring the emerging legal questions that the technology will pose. But most of their questions about generative AI are still unanswered.
Features

U.S. Regulators Lift the Curtain on Data Practices with Assessment, Reporting and Audit Requirements
The assessment and audit requirements of the new generation of state data protection laws will force U.S. companies to move beyond mere window dressing and instead require them to develop fulsome data protection programs.
Features

Artificial Intelligence Redefines Our Defense Against Cyber Threats
The cybersecurity landscape is on the brink of a transformative shift, with predictive analytics and behavioral analysis leading the charge for more resilient and adaptive defenses.
Features

Deep Fake of CFO on Videocall Used to Defraud Company of $25M
Hackers are using AI to sift large digital data to identify more convincing approaches for their scams as well as weaknesses in weaknesses in software coding or network security.
Features

5 Expert Cybersecurity Steps to Take in 2024
As many CISOs and cyber teams think about the year ahead, and legal professionals consider the far-reaching consequences of cybersecurity, here is a checklist to help them prepare for the biggest cybersecurity trends to come.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Beach Boys Songs Written Decades Ago Triggered Current Quarrel With LawyersThere's current litigation in the ongoing Beach Boys litigation saga. A lawsuit filed in 2019 against Nevada residents Mike Love and his wife Jacquelyne in the U.S. District Court for the District of Nevada that alleges inaccurate payment by the Loves under the retainer agreement and seeks $84.5 million in damages.Read More ›
- Issue-Specific Withdrawal of the ReferenceThis article considers the genesis, tendency and scope of the district courts' withdrawals of the reference in some of the more complex proceedings pending today.Read More ›
- Transfer Tax Implications on Real Property LeasesThe real property transfer tax does not apply to all leases, and understanding the tax rules of the applicable jurisdiction can allow parties to plan ahead to avoid unnecessary tax liability.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Settlement Privilege and the Threat of Legal ActionPart One of this article considers the issue of when a threat to litigate encased by a settlement demand raises the specter of extortion, and the extent to which a potentially extortionate settlement communication should be outside the scope of the privilege.Read More ›