Features
FTC Warns Companies of Children's Privacy Violations
On May 15, the Federal Trade Commission (FTC) sent letters to more than 90 businesses, informing them that they could potentially be in violation of the Children's Online Privacy Protection Act (COPPA) when changes to the law go into effect on July 1.
The Federalization of Bitcoins
On March 18, the Financial Crimes Enforcement Network of the Treasury Department (FinCEN) issued guidance on the application of its regulations: 'Application of FinCEN's Regulations to Persons Administering, Exchanging, or Using Virtual Currencies.' Much of its attention is focused on the bitcoin, a virtual currency introduced in 2009, although this currency is not mentioned by name.
Features
The Reality of Virtual ADR
While Internet applications of ADR are neither technologically nor legally restricted to disputes arising out of Internet transactions, it seems to be particularly suitable for the resolution of e-commerce disputes when parties are frequently located far from one another.
Features
Using IP to Prevent Negative UGC Comments
Smart companies understand that the power of user generated content (UGC) is that it is at least somewhat out of control. They craft their brand strategies accordingly, using social media to address customer concerns directly and publicly, rewarding social media influencers and picking their battles. But still, the courts remain full of litigants who do not seem to get the message. In particular, some businesses continue to attempt to use intellectual property law to stop customers from sharing their experiences on the Internet.
Columns & Departments
Bit Parts
Jury Instructions for Implied Contract Cases<br>No Safe Harbor for Uploads of Pre-1972 Sound Recordings
Features
Identifying Unnamed Online Speakers
The '<i>Dendrite</i> test,' has discouraged lawsuits whose real objective is identifying anonymous speakers. Prior to <i>Dendrite</i>, thousands of lawsuits were filed each year seeking to identify Internet speakers, and enforcement of subpoenas was almost automatic. Since <i>Dendrite</i>, both the number of lawsuits designed to identify Internet speakers and the automatic nature of the enforcement of those subpoenas has declined due to the broad application of Dendrite. Recently, an appellate court in <i>Warren Hospital v. John Does (1-10)</i> has limited the application of <i>Dendrite</i>.
Columns & Departments
IP News
Highlights of the latest intellectual property news from around the country.
Features
Lenz Lawsuit Dances to a Fair Use Tune and Heads for Trial
A California district court has denied cross summary judgment motions in a case that has implications for fair use analysis under copyright law and DMCA litigation.
Features
Should Lying About Your Age Online Be a Federal Crime?
The calls for amending the Computer Fraud and Abuse Act (CFAA) have grown louder. In response, several bills have been introduced in Congress offering amendments to the CFAA. The question is whether Congress will use this opportunity to draft a law that attempts to reflect the interests of all U.S. citizens or simply increase the criminal penalties for violating the CFAA so as to appear tough on crime.
Features
FTC Warns Companies of Children's Privacy Violations
On May 15, the Federal Trade Commission (FTC) sent letters to more than 90 businesses, informing them that they could potentially be in violation of the Children's Online Privacy Protection Act (COPPA) when changes to the law go into effect on July 1.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- What Happens to Surplus Funds in Tax Lien Foreclosures?When a sale follows a municipality's foreclosure on a tax lien, who is entitled to sale proceeds that exceed the amount of the tax lien?Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
