Features

China's Cybersecurity Law Isn't Just About Cybersecurity
The law — which includes data localization mandates, cybersecurity best practices, and data transfer restrictions — has similarities to other cyber laws such as the EU's General Data Protection Regulation (GDPR). But in this case, it's also being used to police internet content and behavior.
Features

Gone, But Not Forgotten: Evidence from the Archived Internet
As useful as evidence from the archived Internet can be in many white collar trials, admitting it into evidence is not always a straightforward proposition, as a number of recent cases show.
Features

<i>Case Study:</i> How Mesa Systems Resolved Its Phishing Issues
Phishing is a constantly changing landscape, which requires unwavering attention and focus.
Features

Iglesias's Music Streaming Suit Confronts Big Industry Issue
Music superstar Enrique Iglesias wasn't dancing around the point when he recently filed a lawsuit in Miami federal court against Universal International Music.
Features

Online Marketing Practices Continue to Pose Regulatory Threats for the Financial Services Industry
Last year, the FTC released a staff report on Cross-Device Tracking, which added to the FTC's efforts to regulate emerging issues in the ever-evolving area of online behavioral advertising. The advertising in question involves the collection of data from a particular computer or device regarding a user's Internet-viewing behavior over time and across non-affiliate websites. Cross-device tracking is the logical next step for this technology.
Features

Online Marketing Practices Continue to Pose Regulatory Threats for the Financial Services Industry
Last year, the Federal Trade Commission (FTC) released a staff report on Cross-Device Tracking, which added to the FTC's efforts to regulate emerging issues in the ever-evolving area of online behavioral advertising. The advertising in question involves the collection of data from a particular computer or device regarding a user's Internet-viewing behavior over time and across non-affiliate websites. Ostensibly, this technology obtains user preferences or interests. Cross-device tracking is the logical next step for this technology.
Features

The Recent Court and Regulatory Battles Behind the Net Neutrality Controversy
Though it has been a news focus recently, the legal issue of “net neutrality,” or an open Internet, has been a point of contention between Internet access providers and network users since the mid-1990s. Both sides have zealously but unsuccessfully lobbied Congress with multiple efforts to have desired legislation passed. This has left us instead with shifting regulatory actions taken by the Federal Communications Commission (FCC) attempting to address the issue.
Features

Marketing Tech: SEO: Will It Actually Work for Your Firm?
Search engine optimization (SEO) is a great way to help drive traffic to your website, but is also a very misunderstood term. This article helps clarify what SEO really is, and if it will help with your business development activities.
Features

An IP Protection Primer for Entertainment Tech Startups
The tech-heavy entertainment industry is an active field for tech startup companies developing potential patents and trade secrets. But many cash conscious startups are forced to initially neglect protection planning for these intellectual property assets, instead allocating scarce resources to set up and initial operation costs. This article suggests some practical and economical steps for startups, especially those with tight finances, to protect what may become valuable patents and trade secrets.
Features

Regulators are Catching Up to Cryptocurrency and Blockchain Technology within the Financial Services Industry
<b><i>Part Two of a Two-Part Article</b></i><p>The proliferation of cryptocurrency and blockchain is being driven by the efficiencies and protections afforded to early adopters. The operational efficiencies and resulting cost savings are readily apparent in the financial services industry and are equally coveted by the entities trying to implement them and by the customers who will benefit from the implementation. However, neither party can fully enjoy these benefits without first understanding and overcoming the various regulatory hurdles.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- The Anti-Assignment Override ProvisionsUCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?Read More ›