Features

Data Rights, Data Duties, & Data Risks: The American Data Privacy and Protection Act
While the ADPPA represents compromises between Democratic and Republican leadership of the U.S. Senate and House of Representatives, particularly around the thorny issues of state law preemption and private rights of action, there are other legislative and big tech industry players pushing their own agendas for comprehensive national data privacy and security frameworks.
Features

Not Just Your Same Old Privacy Legislation: A Compliance Briefing for Privacy Officers on the New Canadian Consumer Privacy Protection Act
Part One In a Series This article, which reviews the Canadian Consumer Privacy Protection Act, first seeks to identify the delta between the Act and PIPEDA in order to allow privacy officers of organizations that are already PIPEDA compliant to identify the net new compliance requirements under the Act and second, to highlight the provisions of the Act which, if breached, could lead to the imposition of significant fines.
Features

Data Privacy and Security Considerations for Mobile Health App Developers and Their Counsel
In light of the evolving legal and regulatory landscape, app developers and their counsel should examine developers' privacy and security practices and take steps to safeguard sensitive data related to reproductive health.
Features

California's Latest Privacy Rulemaking Proposes Further Obligations for Businesses
While the the California Privacy Protection Agency kicked some of the more difficult issues down the road for further consideration, its first draft of proposed Regs is quite comprehensive with respect to the issues addressed. The authority for some of what is proposed is questionable and will likely be challenged in comments, if not judicial action, if such provisions become final.
Features

Proactively Tackling Unstructured Data Can Give Competitive Advantage
Unstructured data comprises 80% of total data volume for legal organizations, which means that on average, only one-fifth of the entirety of the data set is properly secured and actively managed. Although some believe that ignoring unstructured data establishes plausible deniability that relinquishes them from culpability when a breach occurs, it's an untenable position from both a regulatory and brand reputational perspective.
Features

Cloud-Based Discovery Is at Critical Mass: A Practical Approach
Part Two of a Two-Part Series Cloud technology use in discovery is inevitable. Fortunately, one of the inherent benefits of cloud discovery platforms is the ability to spin up a proof of concept matter quickly to get your feet wet. This article provides a practical approach to making sure you're ready for the cloud when the time comes.
Features

Online Accessibility and SEO
How can you make your user experience the best it can be for all potential clients, and lead with empathy and equity as you demonstrate your knowledge? That's where your law firm's SEO strategy comes into play.
Features

Traditional Legal Ops Putting Law Firms At Disadvantage When Recruiting for Cybersecurity and Privacy
Law firms are still insisting on engaging with clients in the traditional legal model — by hours billed. Whereas cybersecurity services such as breach monitoring have the potential for a much deeper and stickier relationship with the client.
Features

Ninth Circuit Says Copyright Plaintiffs Can Reach Back More Than Three Years In Seeking Infringement Damages
How far back from accrual of a claim may a plaintiff reach for copyright damages?
Features

'Banana' Artwork Dispute Presents Slippery Slope for Copyright
In July, the U.S. District Court for the Southern District of Florida denied a motion to dismiss in Morford v. Cattelan, a decision that began by posing the question: "Can a banana taped to a wall be art?"
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- Inferring Dishonesty: The Fifth Amendment and Fidelity CoverageDishonest employees always have posed a problem for businesses. The average business may lose 6% of its annual revenues to employee fraud, and cumulatively the impact of employee theft on the economy is estimated to be $600 billion annually. <i>See</i> Association of Certified Fraud Examiners ("ACFE"), 2002 Report to the Nation on Occupational Fraud & Abuse, at ii, 4 (2002), available at <i>www.cfenet.com/publications/rttn.asp.</i> Although the average loss through employee embezzlement is $25,000, where computerized financial records or transactions are involved, the average loss increases nearly twentyfold. <i>See</i> National White Collar Crime Center, <i>WCC Issue: Embezzlement/Employee Theft,</i> at 2 (2002), available at <i>http://nw3c.org/downloads/Computer_Crime_Weapon.pdf.</i>Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›