Features

Five Smart Steps to Prepare for GDPR Data Subject Rights
Many corporations around the globe are preparing for May 2018, when Europe's General Data Protection Regulation (GDPR) enforcement kicks in. The regulation encompasses a wide range of nuanced privacy requirements that can be challenging to operationalize. In particular, requirements around the rights of European data subjects — which include the right to be forgotten and rights to access, rectification and objection to processing — will be some of the most difficult to address.
Features

<i>Zeran v. AOL</i> and Its Inconsistent Legacy
<i><b>How the Seminal Fourth Circuit's Ruling Is Applied in Different Circuits</b></i><p>The rule of <i>Zeran</i> has been uniformly applied by every federal circuit court to consider it and by numerous state courts. And it has never been rejected in any precedential opinion. Indeed, it is perhaps a fitting tribute to the viability of <i>Zeran</i> that 20 year later the U.S. Court of Appeals for the Ninth Circuit, in its 12th opinion construing the CDA, barely spent even a sentence affirming dismissal of a defamation claim brought against Facebook over user content, pursuant to the CDA and the rule first developed in <i>Zeran</i>.
Features

What Lies Beneath the Surface: The Dark Web
Nearly all of us access the World Wide Web on at least a daily basis. Yet for many of us, there is a fundamental lack of knowledge about the basic structure of the Internet and the way its different levels interact. This article provides a basic outline of the structure of the Web and some insight as to the purpose for and content housed on each level, as well as give some practical tips to avoid your company's data from ending up on the Dark Web.
Features

When Terms of Use Put 'Reasonably Prudent User' on Notice
On Aug. 17, 2017, the Second Circuit issued its decision in <i>Meyer v. Uber Technologies, Inc.</i>. The appeals court vacated and remanded the trial court ruling by holding that the registration process for Uber Technologies, Inc.'s mobile application formed a legal contract, Less than a month later, the Southern District relied on the <i>Meyer</i> decision in granting the defendant's motion to compel arbitration based on the fact that the design and functionality of defendant's amended terms of use placed plaintiffs' on "reasonably conspicuous notice" of the mandatory arbitration and jury trial waiver provisions.
Features

Trump's Tweets Are 'Official Statements'
President Donald Trump's tweets are official government statements, Justice Department lawyers told a federal judge last month.
Features

Podcast: Phishing
Phishing is one of the more pervasive cyber attacks in the world, and while we've all received phishing emails, phishing attacks have become more sophisticated and come in different forms other than emails from Persian princes.
Features

All Digital Assets Are Not Legally Equal
The Internet has generated a new set of assets known as "digital assets." Broadly defined, a digital asset is an electronic record in which an individual has a right or interest. This definition erroneously implies that digital assets should be treated as a legally equivalent set of assets when, in fact, failure to differentiate digital assets into one of three distinct classes will result in legal difficulties.
Features

What Lies Beneath the Surface: The Dark Web
This article provides a basic outline of the structure of the Web and some insight as to the purpose for and content housed on each level, as well as give some practical tips to avoid your company's data from ending up on the Dark Web.
Features

SCOTUS Takes Up Microsoft Case on Email Privacy
A long-running dispute between Microsoft and the Justice Department over providing the government with certain customer emails in criminal investigations will be refereed by the U.S. Supreme Court.
Features

New-Wave Legal Challenges for Bitcoin and Other Cryptocurrencies
As the adoption of cryptocurrencies — or digital currencies that are encrypted for security — spreads throughout the business and financial sectors, so too do the concerns that lack of regulation render the new-age currency susceptible to fraud, manipulation, and to being used as a vehicle for money laundering. Nevertheless, recent efforts by U.S. enforcement agencies to apply and enforce financial regulations indicate that cryptocurrency-based transactions will be under greater scrutiny than ever before.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Legal Possession: What Does It Mean?Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Cutting Off the Stream: How United States v. Silver Affects "Stream of Benefits" or "Retainer" BriberyAlthough the court stressed that, by vacating certain of former NY State Assembly Speaker Sheldon Silver's counts of conviction, it was clarifying and not altering the "as opportunities arise" theory, it nevertheless emphasized that this theory requires particularity with respect to the "question or matter" that is the subject of the bribe payor and recipient's corrupt agreement.Read More ›