Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Search Warrants for IoT Data Spur Legal, Privacy Complications Image

Search Warrants for IoT Data Spur Legal, Privacy Complications

Ricci Dipshan

<b><i><font size="-1"> Law Enforcement Attempts to Access Amazon Echo Raise Questions over the Viability of IoT Data in Investigations and the Vulnerability of Private Information</b></i></font><p>A case surrounding a mysterious death in a Benton County, AR, has far-reaching implications for the ownership and privacy of data generated from Internet-connected devices.

Features

<i>Online Extra</i><br>DOL Sues Google Over Failure to Provide Compensation Data Image

<i>Online Extra</i><br>DOL Sues Google Over Failure to Provide Compensation Data

Rebekah Mintzer

The Department of Labor (DOL) is asking an administrative law judge to order the company to turn over information on job and salary history for employees…

Features

Virtual Snooping Image

Virtual Snooping

Karen Ellis

The modern-day snoop is all too often someone you know. If this consideration doesn't leave you paranoid and looking over your shoulder, it should.

Features

Presidential Cybersecurity Handoff Image

Presidential Cybersecurity Handoff

Justin Hectus

Given the pending change in administration and uncertainty around President-elect Trump's priorities on cybersecurity, an analysis of the current federal cyber landscape may yield insights into how the next administration might prioritize their approach on this important front.

Features

Internet Law in a Trump Presidency Image

Internet Law in a Trump Presidency

Samar Ali

President Trump is already being pressured to reverse President Obama's Open Internet Order (also known as “net neutrality”) and take an aggressive stance against it. It remains to be seen how President Trump will balance the call for privacy regulations amidst our country's vulnerability to cyber-attacks.

Features

Most Firms Feel Assured in Cybersecurity Abilities, But Is That False Confidence? Image

Most Firms Feel Assured in Cybersecurity Abilities, But Is That False Confidence?

Ricci Dipshan

Law firms are increasingly confident in their cybersecurity capabilities, despite many falling short of adequate breach response preparation.

Features

Practical Approaches to the EU-US Privacy Shield Image

Practical Approaches to the EU-US Privacy Shield

Dan Panitz & H. Bruce Gordon

This article discusses the corporate impact of the EU-US Privacy Shield and practical approaches to managing global corporate data in the wake of <i>Schrems</i>.

Features

In Light of Recent FTC Actions, Review Your Privacy Policy Image

In Light of Recent FTC Actions, Review Your Privacy Policy

Devika Kornbacher, Scott Breedlove, Janice Ta & Aislinn Affinito

The United States does not have comprehensive legislation addressing the privacy implications of the collection and use of geolocation data. However, the Federal Trade Commission (FTC) has used its enforcement authority under Section 5 of the FTC Act to regulate companies engaged in unfair or deceptive practices involving geolocation data.

Features

WhatsApp, Encryption and the Battle with Law Enforcement Image

WhatsApp, Encryption and the Battle with Law Enforcement

Domingo Montanaro

It is widely accepted that much of today's communications are digital — and as a result, the encryption of data, the privacy laws governing that data, and the role that governments play when national security and law enforcement issues are at stake is a very hot topic.

Features

The Human Factor In Information Security Image

The Human Factor In Information Security

Michael Kemps & Kimberly Pease

No one can deny that cyberattacks are the new norm. Such risks will increasingly challenge our ability to operate our businesses. In the world of cybercrime, everyone — from individuals to nation-states — is a target. However, some targets are more alluring than others.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›