Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

The Eyes (and Privacy Laws) of Texas Are Upon You Image

The Eyes (and Privacy Laws) of Texas Are Upon You

Eric Levy

<b><i>Consistent With the Cliché That “Everything's Bigger In Texas,” the Texas Legislature Has Introduced Not One, But Two Separate Bills Relating to the Privacy of Personal Information</b></i><p>The TPPA is arguably the less onerous of the two bills, although you might not necessarily realize it at first blush, given the broad way it defines “personal identifying information” (PII).

Features

Safeguarding Client Data: An Attorney's Duty to Provide 'Reasonable' Security Image

Safeguarding Client Data: An Attorney's Duty to Provide 'Reasonable' Security

David G. Ries

Effective cybersecurity requires an ongoing, risk-based, comprehensive process that addresses people, policies and procedures, and technology, including training. Effective security also requires an understanding that security is everyone's responsibility and constant security awareness by all users of technology.

Features

Getting Ready for Wide-Ranging Reach of California's Data Privacy Law Image

Getting Ready for Wide-Ranging Reach of California's Data Privacy Law

Samuel Cullari & Alexis Cocco

The CCPA is the first of its kind, generally applicable data protection law in the United States. What makes the CCPA unique is not only its applicability to companies like those in the entertainment and media industries, but also the rights it provides to consumers regarding their personal information (PI).

Features

The Principles of Good Cyber Risk Management Image

The Principles of Good Cyber Risk Management

Ankur Sheth & Jano Bermudes

Apart from headline grabbing attacks, we are now seeing an epidemic of cyber attacks. Concern has shifted from dealing with data being stolen and sold on the dark Web to handling serious ransomware and destructive attacks, where attackers are looking for immediate monetary output.

Features

Second Circuit Blocks Video Privacy Suit Brought Against Barnes & Noble Image

Second Circuit Blocks Video Privacy Suit Brought Against Barnes & Noble

Jenna Greene

A would-be class action against Barnes & Noble could have cost the bookseller hundreds of millions of dollars — not to mention a reputational hit for allegedly sharing private information about its customers' online video purchases with Facebook.

Features

Privacy Notices, Opt-In Clauses Debated as U.S. Regulators Shape Federal Privacy Law Image

Privacy Notices, Opt-In Clauses Debated as U.S. Regulators Shape Federal Privacy Law

Caroline Spiezio

Tech giants' privacy counsel and U.S. senators discussed opt-in policies, lengthy, legalese-filled privacy notices and location tracking. The discussion aimed to further shape a potential U.S. federal data privacy law.

Features

Second Circuit Blocks Video Privacy Suit Brought Against Barnes & Noble Image

Second Circuit Blocks Video Privacy Suit Brought Against Barnes & Noble

Jenna Greene

A would-be class action against Barnes &amp; Noble could have cost the bookseller hundreds of millions of dollars — not to mention a reputational hit for allegedly sharing private information about its customers' online video purchases with Facebook.

Features

A Survey of Proposed Federal Privacy Legislation and the Year Ahead Image

A Survey of Proposed Federal Privacy Legislation and the Year Ahead

Jeffrey Atteberry

The social, economic, and political forces pushing for a comprehensive overhaul of the nation's privacy regime are numerous, and many see 2019 as presenting the best opportunity yet for passage of federal data privacy legislation.

Features

2019 Trends Overview: Compliance, Privacy and Security Family Tree Image

2019 Trends Overview: Compliance, Privacy and Security Family Tree

Mark Sangster

In 2019, regulations and laws will continue to define how businesses collect and use consumer data, and their obligations to protect this data from misuse, theft or exposure to unauthorized parties.

Features

Causation and Harm In Data Breach Litigation Image

Causation and Harm In Data Breach Litigation

Brian Ellman & Jee-Yeon Lehmann

Demonstrating that a data breach has resulted in an injury-in-fact can be difficult, because it is not always clear what has happened or will happen with the stolen data.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Legal Possession: What Does It Mean?
    Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›