Features

Five Smart Steps to Prepare for GDPR Data Subject Rights
Many corporations around the globe are preparing for May 2018, when Europe's General Data Protection Regulation (GDPR) enforcement kicks in. The regulation encompasses a wide range of nuanced privacy requirements that can be challenging to operationalize. In particular, requirements around the rights of European data subjects — which include the right to be forgotten and rights to access, rectification and objection to processing — will be some of the most difficult to address.
Features

<i>Zeran v. AOL</i> and Its Inconsistent Legacy
<i><b>How the Seminal Fourth Circuit's Ruling Is Applied in Different Circuits</b></i><p>The rule of <i>Zeran</i> has been uniformly applied by every federal circuit court to consider it and by numerous state courts. And it has never been rejected in any precedential opinion. Indeed, it is perhaps a fitting tribute to the viability of <i>Zeran</i> that 20 year later the U.S. Court of Appeals for the Ninth Circuit, in its 12th opinion construing the CDA, barely spent even a sentence affirming dismissal of a defamation claim brought against Facebook over user content, pursuant to the CDA and the rule first developed in <i>Zeran</i>.
Features

What Lies Beneath the Surface: The Dark Web
Nearly all of us access the World Wide Web on at least a daily basis. Yet for many of us, there is a fundamental lack of knowledge about the basic structure of the Internet and the way its different levels interact. This article provides a basic outline of the structure of the Web and some insight as to the purpose for and content housed on each level, as well as give some practical tips to avoid your company's data from ending up on the Dark Web.
Features

When Terms of Use Put 'Reasonably Prudent User' on Notice
On Aug. 17, 2017, the Second Circuit issued its decision in <i>Meyer v. Uber Technologies, Inc.</i>. The appeals court vacated and remanded the trial court ruling by holding that the registration process for Uber Technologies, Inc.'s mobile application formed a legal contract, Less than a month later, the Southern District relied on the <i>Meyer</i> decision in granting the defendant's motion to compel arbitration based on the fact that the design and functionality of defendant's amended terms of use placed plaintiffs' on "reasonably conspicuous notice" of the mandatory arbitration and jury trial waiver provisions.
Features

Trump's Tweets Are 'Official Statements'
President Donald Trump's tweets are official government statements, Justice Department lawyers told a federal judge last month.
Features

Podcast: Phishing
Phishing is one of the more pervasive cyber attacks in the world, and while we've all received phishing emails, phishing attacks have become more sophisticated and come in different forms other than emails from Persian princes.
Features

All Digital Assets Are Not Legally Equal
The Internet has generated a new set of assets known as "digital assets." Broadly defined, a digital asset is an electronic record in which an individual has a right or interest. This definition erroneously implies that digital assets should be treated as a legally equivalent set of assets when, in fact, failure to differentiate digital assets into one of three distinct classes will result in legal difficulties.
Features

What Lies Beneath the Surface: The Dark Web
This article provides a basic outline of the structure of the Web and some insight as to the purpose for and content housed on each level, as well as give some practical tips to avoid your company's data from ending up on the Dark Web.
Features

SCOTUS Takes Up Microsoft Case on Email Privacy
A long-running dispute between Microsoft and the Justice Department over providing the government with certain customer emails in criminal investigations will be refereed by the U.S. Supreme Court.
Features

New-Wave Legal Challenges for Bitcoin and Other Cryptocurrencies
As the adoption of cryptocurrencies — or digital currencies that are encrypted for security — spreads throughout the business and financial sectors, so too do the concerns that lack of regulation render the new-age currency susceptible to fraud, manipulation, and to being used as a vehicle for money laundering. Nevertheless, recent efforts by U.S. enforcement agencies to apply and enforce financial regulations indicate that cryptocurrency-based transactions will be under greater scrutiny than ever before.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- When Is a Repair Structural or Nonstructural Under a Commercial Lease?A common question that commercial landlords and tenants face is which of them is responsible for a repair to the subject premises. These disputes often center on whether the repair is "structural" or "nonstructural."Read More ›
- Beach Boys Songs Written Decades Ago Triggered Current Quarrel With LawyersThere's current litigation in the ongoing Beach Boys litigation saga. A lawsuit filed in 2019 against Nevada residents Mike Love and his wife Jacquelyne in the U.S. District Court for the District of Nevada that alleges inaccurate payment by the Loves under the retainer agreement and seeks $84.5 million in damages.Read More ›
- Technology in Marketing: Where to Invest Your Marketing Technology DollarsLaw firms have realized that using technology ' particularly the Internet ' is a powerful tool for creating a more level playing field to enhance their images, expand their visibility in targeted markets and drive business to their firms. However, with so many competing interests for limited marketing dollars, where should you invest your firm's resources to get the most bang for the buck?Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›