Storing and sharing data "in the cloud" has become, in many instances, a business necessity. The practical and economic advantages of cloud computing are clear ' it eliminates the need to send client data via traditional, costly methods, and is significantly less expensive than building and maintaining the same data storage capacity in-house.
- September 02, 2015Gregory Mottla and L. Elise Dieterich
Online impersonation is defined in the New York Code provisions that prohibit the practice, as the act of impersonating another "under an assumed character with intent to obtain a benefit or to injure or defraud another." The foremost case brought under this law, People v. Golb, in many ways epitomizes the bizarre and highly esoteric reasons why someone chooses to impersonate another in the first place.
September 02, 2015Richard Raysman and Peter BrownEarly on in 2015, pundits were already predicting that the extent and number of data breaches from 2014 would severely pale in comparison to those that would occur in 2015. Inevitably, people across the country, victims, media, members of government, and even litigious-minded attorneys, are scrambling to determine what legal recourse exists to not only retroactively seek retribution, but also proactively enforce data security methods ' a task that is still at its nascent stages of development.
September 02, 2015Stephen TregliaPlaintiffs lawyers representing some banks and financial institutions caught up in Target's 2013 data breach say the $67 million deal struck last month between the retailer and Visa Inc. leaves their clients shortchanged.
August 31, 2015Amanda BronstadA federal judge in San Jose has refused to certify a class of former Apple customers who claim the company illegally intercepted their text messages as a result of a glitch in its iMessage system.
August 31, 2015Ross ToddWith unfettered access to critical documents and information, law firms are an attractive target for hackers. Even when firms employ cutting-edge data security techniques, their possession of corporate data still multiplies the surface area of risk for that information. A recent survey of the Am Law 200, which tapped nearly one-third of firm CIOs for their experience, is showing the extent to which the highest grossing firms are spending to mitigate the risk associated with data security.
August 31, 2015Chris DiMarcoLawyers for Yelp Inc. scored a victory in August over plaintiffs who had demanded to be paid for reviews they posted to Yelp's website.
August 31, 2015Marisa KendallFacebook Inc. will have home court advantage in a trio of privacy class actions claiming the company violated an Illinois law governing the collection of biometric data with its 'tag suggestion' feature.
August 31, 2015Ross ToddA federal appeals court last month sided with actor Michael Keaton in a breach of contract suit brought against him by the producers behind his box office flop "Merry Gentleman.
August 30, 2015Mike SacksBecause family law attorneys share a deep understanding of many of their clients' legal matters, and many attorneys have experienced the same challenges faced by their clients, what role, if any, does this identification play in the practice of family law?
August 27, 2015ALM Staff | Law Journal Newsletters |

