Features

EU Push to Filter 'Illegal' Content Raises Alarms in Silicon Valley
The European Commission (EU) is ramping up pressure on tech companies to more aggressively use automated filtering to scrub "illegal" content from the Internet, a move that is drawing criticism from some lawyers and free speech activists in Silicon Valley.
Features

Bitcoin Is Fueling the Ransomware Epidemic
Money is a powerful motivator, but it alone wasn't enough to fuel the ransomware epidemic. After all, the first documented ransomware infection was in 1989, but it remained relatively unknown until its resurgence over the past five years. So what changed? In short, bitcoin.
Features

The Myth of the Secure Cloud
"There's really no such thing as the cloud, there are only other people's computers." This may have been true at first; but it is now worth some investigation if the present threat environment today demands a secure cloud.
Features

Procedures for Protecting Entertainment Domain Names Against Cybersquatters
Because there are so many new digital channels for possible intellectual property infringement, knowledge of the various mechanisms available to combat the issue is vital to enabling entertainment industry owners to protect their brand.
Features

The Equifax Breach: Why This One Is Different
This is not the first time that a credit reporting agency has been breached, nor is it the first time that Equifax has reported a breach. What <i>is</i> different with the current breach is its size and the nature of information compromised, as well as the implications of the breach in light of the increasingly complex web of cybersecurity regulations nationwide.
Features

Big Data, Web 'Scraping' and Competition Law
<b><i>The Debate Continues</i></b><p>Web "scraping" is one method of accumulating data that has sparked recent legal debate, both antitrust and otherwise. Legal challenges to Web scraping have involved privacy claims and claims under the federal Computer Fraud and Abuse Act, in addition to antitrust claims about the need to collect public data to be able to compete freely.
Features

There May Be 'No Do-Overs,' but SEC Hack Provides Important Security Lessons
Even the Securities and Exchange Commission (SEC) can get hacked — and the recently announced cyber attack against the SEC is providing an important wake-up call for U.S. companies regulated by the powerful agency and the attorneys they work with.
Features

Website Accessibility: The Law and Your Business Priorities
The first step to solving a problem is knowing it exists. But many businesses have never thought to ask whether their customer-facing websites are accessible to people with disabilities, and only become aware of the issue when they are sent a demand letter or served with a lawsuit alleging that their site violates the Americans with Disabilities Act (ADA).
Features

Trade Secrets Litigation: The No-Longer-Forgotten Part of the Tech IP Arsenal
<b><i>With Massive Jury Rewards and the DTSA Encouraging Federal Litigation, Trade Secrets Litigation Is Seeing a Surge in the Tech Industry</b></i><p>These days, many of the big IP litigation battles involving companies like Facebook, Uber, and Epic, have nothing to do with patents, trademarks or copyrights at all. Instead, it's all about the perhaps forgotten part of IP: trade secrets.
Features

What's the Deal with WhatsApp?
<b><i>Investigating and Discovering Mobile Device Data</b></i><p>Analyzing data from mobile devices is still uncharted territory for many in Legal and IT. Accordingly, today's modern legal and technology professionals need to brush-up on all things mobile. This includes understanding where applicable data resides in a mobile device and what common challenges are associated with accessing, preserving and extracting this data. One such app taking the mobile device world by storm is WhatsApp.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The 'Sophisticated Insured' DefenseA majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.Read More ›
- The Brave New World of Cybersecurity Due Diligence in Mergers and Acquisitions: Pitfalls and OpportunitiesLike poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.Read More ›
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric CodeIn an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.Read More ›
- Guidance on Distributions As 'Disbursements' and U.S. Trustee FeesIn a recent case from the Bankruptcy Court for the District of Delaware, In re Paragon Offshore PLC, the bankruptcy court provided guidance on whether a post-plan effective date litigation trust's distributions constituted disbursements subject to the U.S. Trustee fee "tax."Read More ›