Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

The Eyes (and Privacy Laws) of Texas Are Upon You Image

The Eyes (and Privacy Laws) of Texas Are Upon You

Eric Levy

<b><i>Consistent With the Cliché That “Everything's Bigger In Texas,” the Texas Legislature Has Introduced Not One, But Two Separate Bills Relating to the Privacy of Personal Information</b></i><p>The TPPA is arguably the less onerous of the two bills, although you might not necessarily realize it at first blush, given the broad way it defines “personal identifying information” (PII).

Features

Safeguarding Client Data: An Attorney's Duty to Provide 'Reasonable' Security Image

Safeguarding Client Data: An Attorney's Duty to Provide 'Reasonable' Security

David G. Ries

Effective cybersecurity requires an ongoing, risk-based, comprehensive process that addresses people, policies and procedures, and technology, including training. Effective security also requires an understanding that security is everyone's responsibility and constant security awareness by all users of technology.

Features

Getting Ready for Wide-Ranging Reach of California's Data Privacy Law Image

Getting Ready for Wide-Ranging Reach of California's Data Privacy Law

Samuel Cullari & Alexis Cocco

The CCPA is the first of its kind, generally applicable data protection law in the United States. What makes the CCPA unique is not only its applicability to companies like those in the entertainment and media industries, but also the rights it provides to consumers regarding their personal information (PI).

Features

The Principles of Good Cyber Risk Management Image

The Principles of Good Cyber Risk Management

Ankur Sheth & Jano Bermudes

Apart from headline grabbing attacks, we are now seeing an epidemic of cyber attacks. Concern has shifted from dealing with data being stolen and sold on the dark Web to handling serious ransomware and destructive attacks, where attackers are looking for immediate monetary output.

Features

Second Circuit Blocks Video Privacy Suit Brought Against Barnes & Noble Image

Second Circuit Blocks Video Privacy Suit Brought Against Barnes & Noble

Jenna Greene

A would-be class action against Barnes & Noble could have cost the bookseller hundreds of millions of dollars — not to mention a reputational hit for allegedly sharing private information about its customers' online video purchases with Facebook.

Features

Privacy Notices, Opt-In Clauses Debated as U.S. Regulators Shape Federal Privacy Law Image

Privacy Notices, Opt-In Clauses Debated as U.S. Regulators Shape Federal Privacy Law

Caroline Spiezio

Tech giants' privacy counsel and U.S. senators discussed opt-in policies, lengthy, legalese-filled privacy notices and location tracking. The discussion aimed to further shape a potential U.S. federal data privacy law.

Features

Second Circuit Blocks Video Privacy Suit Brought Against Barnes & Noble Image

Second Circuit Blocks Video Privacy Suit Brought Against Barnes & Noble

Jenna Greene

A would-be class action against Barnes &amp; Noble could have cost the bookseller hundreds of millions of dollars — not to mention a reputational hit for allegedly sharing private information about its customers' online video purchases with Facebook.

Features

A Survey of Proposed Federal Privacy Legislation and the Year Ahead Image

A Survey of Proposed Federal Privacy Legislation and the Year Ahead

Jeffrey Atteberry

The social, economic, and political forces pushing for a comprehensive overhaul of the nation's privacy regime are numerous, and many see 2019 as presenting the best opportunity yet for passage of federal data privacy legislation.

Features

2019 Trends Overview: Compliance, Privacy and Security Family Tree Image

2019 Trends Overview: Compliance, Privacy and Security Family Tree

Mark Sangster

In 2019, regulations and laws will continue to define how businesses collect and use consumer data, and their obligations to protect this data from misuse, theft or exposure to unauthorized parties.

Features

Causation and Harm In Data Breach Litigation Image

Causation and Harm In Data Breach Litigation

Brian Ellman & Jee-Yeon Lehmann

Demonstrating that a data breach has resulted in an injury-in-fact can be difficult, because it is not always clear what has happened or will happen with the stolen data.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategic Uses of a Rule 2004 Exam
    While most bankruptcy practitioners are familiar with the basic concepts behind the Rule 2004 exam, some are less familiar with the procedural intricacies of obtaining, conducting, and responding to the exam ' intricacies that often involve practices and procedures adapted from civil discovery that are beyond the scope of pure bankruptcy practice. This article explains.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›