Features
TikTok’s ‘Blackout Challenge’ and Section 230 Immunity
In Anderson v. TikTok, Inc., the Third Circuit held that the liability of an Internet Service Provider such as TikTok depended on whether TikTok was sharing content via the platform’s algorithm or engaged in something more. The question of whether TikTok’s recommendation algorithm transformed content into TikTok’s own expressive activity was not immunized by Section 230 and has disrupted the protection previously enjoyed by Internet platforms like TikTok.
Features
Florida’s Digital Bill of Rights Joins the Regulatory Framework
The proliferation of data breaches and increased sophistication of criminal attack vectors has led more states to enact their own reasonable security provisions as part of the patchwork quilt of privacy laws. Nineteen of the U.S. states which have enacted comprehensive privacy laws along with Florida’s Digital Bill of Rights (which took effect summer 2024) have provisions requiring controllers and businesses to establish, implement and maintain reasonable administrative, technical and physical data security practices to protect the confidentiality, integrity and accessibility of personal data.
Features
DOJ Issues New Rule Regulating Handling of Bulk Sensitive Personal Data
The DOJ has proposed a rule that would regulate certain transactions involving bulk sensitive personal data. The rule would implement a complex regulatory framework, with civil and criminal enforcement, that is similar to sanctions and export licensing regimes. It also implicates federal cybersecurity requirements, government contracting and CFIUS actions.
Features
Second Circuit Clarifies Video Privacy Protection Act
The Second Circuit’s decision is notable in that it signals a reversal of the recent trend of dismissals of VPPA claims in courts across the country and could trigger a significant increase in VPPA lawsuits. Although organizations have grappled with VPPA claims for several years, this decision is another red flag to organizations to take immediate steps and ensure compliance with privacy laws to mitigate the risks of VPPA claims.
Features
4 Steps to Safeguard Against Individual Liability for Data Security Failures
With cyberattacks on the rise and class actions arising from cyberattacks being filed at an increased rate, executives and board members increasingly face the risk of being individually targeted in lawsuits brought by class action plaintiffs and governmental bodies alleging individual liability for data security failures.
Features
NY Revised Cybersecurity Regulation Goes Into Effect: What You Need to Know
On November 1, significant revisions to the regulations enforced by the New York Department of Financial Services (DFS) — the state’s financial services regulator — went into effect. The DFS revisions create a long-arm provision in that the changes affect not only New York State companies, but also their affiliates, and therefore the revisions could have an impact far beyond New York State borders.
Features
Most Companies Don’t Honor Privacy Opt-Outs
Global privacy control lets computer users set privacy preferences in their browsers, automatically sharing those choices whenever users go to a site. It’s supposed to give individuals more control over their personal data, allowing them to opt in or out of cookie usage, data sharing, data selling and targeted advertising.But they only work if companies honor them. And in most instances, they don’t.
Features
Federal Judge Allows Public Nuisance Claims Against Social Media Sites to Go Forward
Social media took another hit Nov. 15 after a federal judge allowed most of the public nuisance claims brought by school districts in the addiction cases to move forward.
Features
The 2024 LTN Law Firm Tech Survey
The 2024 LTN Law Firm Tech Survey spoke with 30 technologists at top U.S. law firms to get a sense of what technology issues they faced over the past year, how their technology posture, policies and investments are changing, and their thoughts on technology’s impact on the future of the legal industry.
Features
Untangling the Costs of Cyber Breach Recovery (and Strategies to Avoid Overbilling)
As cyber threats (and their price tags) evolve, so must the strategies companies use to navigate breach recovery. The future of breach recovery lies in smarter, faster solutions — particularly AI-driven approaches that streamline data mining and ensure breach notification compliance without compromising security or inflating costs.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Law Firm Real Estate Strategy: Attorney Offices Are Out, Conference Rooms Are InLaw firms are navigating a paradigm shift in how they approach office space. With the rise of flexible workplaces, firms are finding that when their attorneys do come into the office, the main goal is to connect and collaborate with peers — and this shift has transformed how law firms address their real estate needs.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The Perfect Storm: Why Contract Hiring Will Eclipse Direct Hiring In Privacy and Tech In 2024Part Two of a Two Part Article Part 1 of this article looked at how remote flexibility is driving job seekers, that most privacy programs will use contractors by 2026, the speed of hire, the real cost of DIY staffing and whether posting jobs online really works. Part 2 looks at what's next for CPOs, AI jobs in privacy, where the new jobs will come from, whose salaries are spiking and some guidance for the latter half of 2024.Read More ›
