Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

'Keyword Warrants' Pose Privacy Threat Image

'Keyword Warrants' Pose Privacy Threat

Logan Youngworth-Wright, Bowman Taylor & Rubin Sinins

The practice of seeking a "keyword warrant" is a technique of dragnet policing. A keyword warrant requires the production of all IP addresses for anyone who inputs a particular word or phrase into an internet search engine. The search results are then used to identify a device user.

Features

FTC Revises Children's Online Privacy Rule to Extend Parental Consent to Targeted Advertising Image

FTC Revises Children's Online Privacy Rule to Extend Parental Consent to Targeted Advertising

Chris O'Malley

The Federal Trade Commission in January provided more details on its proposed changes to the Children's Online Privacy Protection Rule, underscoring the need for online operators to review and prepare to update their policies and procedures.

Features

United Kingdom Approves Online Safety Bill; Making Social Media Companies Responsible Image

United Kingdom Approves Online Safety Bill; Making Social Media Companies Responsible

Peter Brown

The United Kingdom's Online Safety Bill makes social media companies responsible to prevent and remove illegal or dangerous content, including posts relating to terrorism, child exploitation, hate crimes or fraud.

Features

New Jersey Looks to Other States In Enacting Data Privacy Legislation Image

New Jersey Looks to Other States In Enacting Data Privacy Legislation

John T. Wolak & William C. Martinez

At this juncture New Jersey stands at a crossroad, with the Legislature facing important choices on the scope and terms of comprehensive privacy legislation that will have a dramatic impact on business operations as well as the individual rights of New Jersey residents.

Features

In Case You Missed It: AI Ethics, Algorithms and Other Takeaways from the First-Ever IAPP AI Conference Image

In Case You Missed It: AI Ethics, Algorithms and Other Takeaways from the First-Ever IAPP AI Conference

Isha Marathe

The conference's panels and keynotes looked to connect the dots between the tools governments and individuals have in the age of AI to protect themselves — and the tools they will need to develop.

Features

California Privacy Bill Could Upend the Way Data Brokers Do Business In the Golden State Image

California Privacy Bill Could Upend the Way Data Brokers Do Business In the Golden State

Maria Dinzeo

A California privacy bill that will give consumers the power to delete their personal information through a single request may soon become law, and could upend the way data brokers, advertisers and publishers do business in the Golden State.

Features

The EU-U.S. Data Privacy Framework: Did Transferring Personal Data from the EU to the U.S. Just Get Easier? Image

The EU-U.S. Data Privacy Framework: Did Transferring Personal Data from the EU to the U.S. Just Get Easier?

Wim Nauwelaerts

Businesses and organizations that (regularly) transfer personal data from the EU to the U.S. should carefully assess, on a case-by-case basis, whether it makes sense to rely on the new EU-U.S. Data Privacy Framework or to use one of the other data transfer tools that are available under the GDPR.

Features

Florida's New Data Privacy Bill Is an Outlier, Going Both Broad and Narrow Image

Florida's New Data Privacy Bill Is an Outlier, Going Both Broad and Narrow

Cassandre Coyer

The Florida law, which will go into effect on July 1, 2024, positions itself as an outlier among other state data privacy regulations.

Features

Preparing Companies for Impending Data Privacy, Cybersecurity Changes Image

Preparing Companies for Impending Data Privacy, Cybersecurity Changes

Sarah F. Hutchins

Failing to pay attention to shifting data privacy and security regulations can be costly. Here's an overview of what's been happening — and what's likely to happen next — in the world of data privacy and security.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Technology in Marketing: Where to Invest Your Marketing Technology Dollars
    Law firms have realized that using technology ' particularly the Internet ' is a powerful tool for creating a more level playing field to enhance their images, expand their visibility in targeted markets and drive business to their firms. However, with so many competing interests for limited marketing dollars, where should you invest your firm's resources to get the most bang for the buck?
    Read More ›
  • Coverage Issues Stemming from Dry Cleaner Contamination Suits
    In recent years, there has been a growing number of dry cleaners claiming to be "organic," "green," or "eco-friendly." While that may be true with respect to some, many dry cleaners continue to use a cleaning method involving the use of a solvent called perchloroethylene, commonly known as perc. And, there seems to be an increasing number of lawsuits stemming from environmental problems associated with historic dry cleaning operations utilizing this chemical.
    Read More ›