Features
Significant UK Court Ruling on Data Protection Liability
The UK's Court of Appeal gave a very important judgment in March 2015 in a case concerning Google's Internet behavior tracking through a browser. First, misuse of private information is now classified as a tort, thereby in this case enabling proceedings to be issued against a party outside the jurisdiction of the UK; and, second, financial compensation for distress caused by breaches of the Data Protection Act 1998 may now be claimed, despite there being no monetary loss.
Features
e-Mail Risk Mitigation For Law Firms
Each day, attorneys create and handle documents that require strict confidentiality to avoid loss of evidentiary privileges. In today's digital workplace, many of these files are exchanged via e-mail. While e-mail allows for convenience, speed and portability, each attorney using e-mail must ask before sending: "Am I putting my client's confidentiality needs and expectations, as well as my ethical obligations, at risk?"
Columns & Departments
IP News
Federal Circuit: District Courts Must Address <i>Intel</i> Factors In Determining Whether to Modify A Protective Order In Foreign Proceedings <br>Federal Circuit Applies An 'Abuse of Discretion' Standard of Review for a PTO 'Special Circumstances' Determination
Features
Data Sharing in the Cloud
Storing and sharing data "in the cloud" has become, in many instances, a business necessity. The practical and economic advantages of cloud computing are clear ' it eliminates the need to send client data via traditional, costly methods, and is significantly less expensive than building and maintaining the same data storage capacity in-house.
Features
Online Impersonation Continues, With Varying Consequences
Online impersonation is defined in the New York Code provisions that prohibit the practice, as the act of impersonating another "under an assumed character with intent to obtain a benefit or to injure or defraud another." The foremost case brought under this law, <i>People v. Golb</i>, in many ways epitomizes the bizarre and highly esoteric reasons why someone chooses to impersonate another in the first place.
Features
Recent Challenges To the FTC's Data Regulation Authority
Early on in 2015, pundits were already predicting that the extent and number of data breaches from 2014 would severely pale in comparison to those that would occur in 2015. Inevitably, people across the country, victims, media, members of government, and even litigious-minded attorneys, are scrambling to determine what legal recourse exists to not only retroactively seek retribution, but also proactively enforce data security methods ' a task that is still at its nascent stages of development.
Features
<b><i>Online Extra:</b></i> Banks' Lawyers Balk at Target's Data-Breach Deal
Plaintiffs lawyers representing some banks and financial institutions caught up in Target's 2013 data breach say the $67 million deal struck last month between the retailer and Visa Inc. leaves their clients shortchanged.
Features
<b><i>Online Extra:</b></i> Apple Beats Back Privacy Suit Over iMessage Glitch
A federal judge in San Jose has refused to certify a class of former Apple customers who claim the company illegally intercepted their text messages as a result of a glitch in its iMessage system.
Features
<b><i>Online Extra:</b></i> Am Law 200 Firms Spending $7M on Cybersecurity Annually
With unfettered access to critical documents and information, law firms are an attractive target for hackers. Even when firms employ cutting-edge data security techniques, their possession of corporate data still multiplies the surface area of risk for that information. A recent survey of the Am Law 200, which tapped nearly one-third of firm CIOs for their experience, is showing the extent to which the highest grossing firms are spending to mitigate the risk associated with data security.
Features
<b><i>Online Extra:</b></i> Yelp Fends Off Suit Seeking Pay for Posters
Lawyers for Yelp Inc. scored a victory in August over plaintiffs who had demanded to be paid for reviews they posted to Yelp's website.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Enhanced Oversight of Search Warrants and Title III WiretapsSearch warrants and wiretaps were once used primarily to investigate organized crime, drug dealing and terrorism. In recent years, however, prosecutors have employed these tools increasingly in the context of white-collar crime to the point where it is now commonplace.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The Right to Associate in the DefenseThe "right to associate" permits the insurer to work with the insured to investigate, defend, or settle a claim. Such partnerships protect the insurer and can prove beneficial to the insured's underlying case and ultimate exposure.Read More ›
- DOJ's Cyber Fraud Initiative: A Wake-up Call That Keeps RingingDOJ's Cyber Fraud Initiative has been a wake-up call for companies to prioritize cybersecurity and adhere to stringent standards. By leveraging the FCA, DOJ has used a powerful enforcement tool to target a wide range of cybersecurity failures and misrepresentations. The increasing focus on cybersecurity by enforcement agencies means that robust cybersecurity practices are becoming a standard expectation, not just a best practice.Read More ›