Features

Influencing the Influencers
The importance of promoting brands and products on digital platforms has continued to grow as advertisers are learning how to use social media to reach out to specific populations by harnessing the power and goodwill of the people on these platforms that are popular with and influence particular niche groups of interest. These so-called “influencers” can have thousands, or even millions and tens of millions of followers. But when is the influencer an objective critic, and when is she a paid spokesperson?
Features

Artificially Intelligent Blockchain of Things: Examining Legal Tech's Biggest Buzzwords
<b><i>Panelists at ALM Cybersecure 2017 Delved Into the Year's Biggest Legal Technology Buzzwords and the Hype Fueling Their Popularity</i></b><p>Legal technology has no shortage of buzzwords. The latest slew to take the industry by storm were the topic conversation in a Dec. 5 panel at ALM's CyberSecure event in New York.
Features

The Impact of the Surge of Biometric Data Privacy Lawsuits Against Employers
The growing acceptance of biometric data as a form of identification for employees means that many employers will likely have to face issues covered in state legislation in the immediate future.
Features

Sixth Circuit Issues Ruling of First Impression on Unmasking of 'John Doe' Defendants in Copyright Infringement Litigations
Since the start of the digital media era, content industries have engaged in a tug-of-war with courts over whether the identity of defendants accused of violating plaintiffs' rights, via online distribution, can be revealed.
Features

ESPN Prevails in Video Privacy Suit
The U.S. Court of Appeals for the Ninth Circuit upheld a win for ESPN in a lawsuit that accused the company of sharing the personal identities of customers, who used the sports network's Roku streaming application, with data analytics companies.
Features

Five Smart Steps to Prepare for GDPR Data Subject Rights
Many corporations around the globe are preparing for May 2018, when Europe's General Data Protection Regulation (GDPR) enforcement kicks in. The regulation encompasses a wide range of nuanced privacy requirements that can be challenging to operationalize. In particular, requirements around the rights of European data subjects — which include the right to be forgotten and rights to access, rectification and objection to processing — will be some of the most difficult to address.
Features

NY AG Proposes Stricter Data Security Laws Citing Equifax Breach
Following the Equifax Inc. breach that compromised personal information of 145.5 million Americans including more than 8 million New Yorkers, Attorney General Eric Schneiderman is proposing comprehensive legislation to tighten data security laws
Features

Uber In-House Attorney Out Behind Massive Cyberattack That Went Undisclosed
<b><i>The Company Failed to Notify 57 Million Users of a Breach In October 2016. Two Employees Tasked with Handling the Response Process Have Left the Company, Including Uber In-House Attorney Craig Clark, Who Reported to the Company's Chief Security Officer.</b></i><p>Uber Technologies Inc. failed to notify 57 million users that their data was exposed in a breach, according to a company blog post published on November 21, which was confirmed by a source close to the matter.
Features

Five Smart Steps to Prepare for GDPR Data Subject Rights
Many corporations around the globe are preparing for May 2018, when Europe's General Data Protection Regulation (GDPR) enforcement kicks in. The regulation encompasses a wide range of nuanced privacy requirements that can be challenging to operationalize. In particular, requirements around the rights of European data subjects — which include the right to be forgotten and rights to access, rectification and objection to processing — will be some of the most difficult to address.
Features

What Lies Beneath the Surface: The Dark Web
Nearly all of us access the World Wide Web on at least a daily basis. Yet for many of us, there is a fundamental lack of knowledge about the basic structure of the Internet and the way its different levels interact. This article provides a basic outline of the structure of the Web and some insight as to the purpose for and content housed on each level, as well as give some practical tips to avoid your company's data from ending up on the Dark Web.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- The Anti-Assignment Override ProvisionsUCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?Read More ›