Features

Asserting Damages for Data Piracy Under the CFAA
When a database is breached in one way or another, the results can be devastating. Many companies suffering this kind of loss turn to litigation, often under the Computer Fraud and Abuse Act, which prohibits improperly accessing a protected computer. There is, however, a growing consensus in the Second Circuit that recovery of certain forms of damages under the CFAA simply is not permitted.
Features

3 Steps to Ensuring Your AI Initiative Does Not Fail
The energy in the legal industry surrounding artificial intelligence (AI) is undeniable. Law firms are investing in innovation or undertaking experiments to test the viability of applying AI-enabled tools to various disciplines. Legal professionals are packing presentations to learn if, how and when the heralded disruption will impact their careers.
Features

Ransomware in Review: 8 Prevention and Response Tips for Your Organization
Electronic data is defining the business world, and with its benefits come many threats. Here's how experts think organizations should protect against ransomware.
Features

<b><i>BREAKING NEWS</b></i><br>Anthem Agrees to Record $115M Data Breach Settlement
Anthem Inc. has agreed to pay $115 million to settle claims related to the massive 2015 cyberattack that affected 78.8 million customers. If approved by U.S. District Judge Lucy Koh of the Northern District of California, the deal would be the largest data breach settlement in history.
Features

New Research: Employee Privacy and Corporate Legal Risk
The use of business email accounts and digital devices for personal communications can be risky for both employers and employees. However, employees of all levels may be commingling corporate communications with their personal information, according to new research.
Features

Searching for Web Crawling's Legal Boundaries
Web pages are a treasure-trove of useful information for companies that are able to capture it using Web crawling (or scraping) technology. Yet, for over 20 years, courts have struggled to draw the line between the usefulness of such information and the rights of the content owners and website operators from which that content is derived. Once a niche issue, the increased use of this technology has compounded the disputes related to it.
Features

New Research: Employee Privacy and Corporate Legal Risk
The use of business email accounts and digital devices for personal communications can be risky for both employers and employees. However, employees of all levels may be commingling corporate communications with their personal information, according to new research.
Features

The State of Data Breach Litigation and How to Avoid It
The number of records compromised in data breaches in 2016 increased an astounding 86% over 2015 breaches. This has led to numerous data breach litigations in the civil and regulatory context. What are the major cases and trends from 2016? And what can organizations do to try to reduce their risks of breaches and litigations?
Features

A Look at Right of Publicity Suit Over <i>Gears of War</i>
Celebrities who are fiercely protective of their image and branding fight back, bringing an increasing number of lawsuits when it appears that a video game creator has borrowed without permission. These right of publicity cases highlight the tension that exists between the rights of public figures to control the way their image and likeness is used in commercial contexts and the First Amendment.
Features

The Challenge of Complying with China's New Cybersecurity Law
In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. The law is set to go into effect June 1, 2017. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- "Holy Fair Use, Batman": Copyright, Fair Use and the Dark KnightThe copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.Read More ›