Features

Avoiding Legal Risks: Crafting a Strong Do Not Call Policy for Compliance
A strong Do Not Call Policy (DNC) is vital to comply with the Telephone Consumer Protection Act. Ensuring robust DNC compliance protects an organization's reputation and increases consumer trust. Below is a practical guide for building and implementing DNC policies that ensure compliance and reduce liability.
Features

TikTok’s ‘Blackout Challenge’ and Section 230 Immunity
In Anderson v. TikTok, Inc., the Third Circuit held that the liability of an Internet Service Provider such as TikTok depended on whether TikTok was sharing content via the platform’s algorithm or engaged in something more. The question of whether TikTok’s recommendation algorithm transformed content into TikTok’s own expressive activity was not immunized by Section 230 and has disrupted the protection previously enjoyed by Internet platforms like TikTok.
Features

Florida’s Digital Bill of Rights Joins the Regulatory Framework
The proliferation of data breaches and increased sophistication of criminal attack vectors has led more states to enact their own reasonable security provisions as part of the patchwork quilt of privacy laws. Nineteen of the U.S. states which have enacted comprehensive privacy laws along with Florida’s Digital Bill of Rights (which took effect summer 2024) have provisions requiring controllers and businesses to establish, implement and maintain reasonable administrative, technical and physical data security practices to protect the confidentiality, integrity and accessibility of personal data.
Features

DOJ Issues New Rule Regulating Handling of Bulk Sensitive Personal Data
The DOJ has proposed a rule that would regulate certain transactions involving bulk sensitive personal data. The rule would implement a complex regulatory framework, with civil and criminal enforcement, that is similar to sanctions and export licensing regimes. It also implicates federal cybersecurity requirements, government contracting and CFIUS actions.
Features

Second Circuit Clarifies Video Privacy Protection Act
The Second Circuit’s decision is notable in that it signals a reversal of the recent trend of dismissals of VPPA claims in courts across the country and could trigger a significant increase in VPPA lawsuits. Although organizations have grappled with VPPA claims for several years, this decision is another red flag to organizations to take immediate steps and ensure compliance with privacy laws to mitigate the risks of VPPA claims.
Features

4 Steps to Safeguard Against Individual Liability for Data Security Failures
With cyberattacks on the rise and class actions arising from cyberattacks being filed at an increased rate, executives and board members increasingly face the risk of being individually targeted in lawsuits brought by class action plaintiffs and governmental bodies alleging individual liability for data security failures.
Features

NY Revised Cybersecurity Regulation Goes Into Effect: What You Need to Know
On November 1, significant revisions to the regulations enforced by the New York Department of Financial Services (DFS) — the state’s financial services regulator — went into effect. The DFS revisions create a long-arm provision in that the changes affect not only New York State companies, but also their affiliates, and therefore the revisions could have an impact far beyond New York State borders.
Features

Most Companies Don’t Honor Privacy Opt-Outs
Global privacy control lets computer users set privacy preferences in their browsers, automatically sharing those choices whenever users go to a site. It’s supposed to give individuals more control over their personal data, allowing them to opt in or out of cookie usage, data sharing, data selling and targeted advertising.But they only work if companies honor them. And in most instances, they don’t.
Features

Federal Judge Allows Public Nuisance Claims Against Social Media Sites to Go Forward
Social media took another hit Nov. 15 after a federal judge allowed most of the public nuisance claims brought by school districts in the addiction cases to move forward.
Features

The 2024 LTN Law Firm Tech Survey
The 2024 LTN Law Firm Tech Survey spoke with 30 technologists at top U.S. law firms to get a sense of what technology issues they faced over the past year, how their technology posture, policies and investments are changing, and their thoughts on technology’s impact on the future of the legal industry.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- CLE Shouldn't Be the Only Mandatory Training for AttorneysEach stage of an attorney's career offers opportunities for a curriculum that addresses both the individual's and the firm's need to drive success.Read More ›
- Discovery of Claim Construction and Infringement Analysis May be Compelled Prior to a Markman HearingA defendant in a patent infringement suit may, during discovery and prior to a <i>Markman</i> hearing, compel the plaintiff to produce claim charts, claim constructions, and element-by-element infringement analyses.Read More ›
- AI's Growing Impact On the Gaming IndustryThe gaming and wagering sector has begun to cross paths with artificial intelligence technology in ways both predictable and unforeseen. As with other industries, AI technology inevitably has found its way into various components of the gaming experience. What is striking, however, is how AI is revolutionizing gaming for operators, regulators, suppliers and patrons alike.Read More ›
- DOJ and States Open Antitrust Case Against Google for Monopolizing Internet Search MarketThe U.S. Department of Justice and dozens of states opened their antitrust case against Google in Washington last month, accusing the tech giant of illegally monopolizing the internet search and related ad markets.Read More ›
- The Anatomy of a Supply Chain CyberattackMitigating Its Risks and the Call for Standardization of Software Development Security Protocols This article details the anatomy of a supply chain cyberattack, explores the existing state of supply chain protective contractual terms, and proposes actionable steps with a collective approach to guide legal professionals through their precarious endeavors.Read More ›