Features

A Primer on the New Jersey Data Privacy Act
The New Jersey Data Privacy Act (NJDPA), went into effect this past Jan. 15. The NJDPA represents New Jersey’s entry into the burgeoning field of data privacy laws, as it joins 18 other states that have passed such laws.
Features

Back to the Future: How Data Privacy Laws Can Teach Us What to Expect With AI Regulation
While the amount of AI legislation introduced in various states is relatively limited, the scope of issues being legislated is quite broad. Despite the many uncertainties that remain to be clarified, there are actually many parallels between how data privacy laws took shape five years ago, and how AI legislation is developing today.
Features

Seventh, Ninth Court Rulings Tighten Reach of Federal Video Privacy Protection Act
The VPPA may be nearly four-decades old and video-rental stores largely a thing of the past, but the rise of online content, streaming services and ancillary activities has brought with it frequent litigation based on the VPPA. The key challenge in these litigations is how to interpret the VPPA’s 1980s terms in light of today’s digital advances.
Features

Seventh, Ninth Court Rulings Expand and Tighten Reach of Federal Video Privacy Protection Act
The VPPA may be nearly four-decades old and video-rental stores largely a thing of the past, but the rise of online content, streaming services and ancillary activities has brought with it frequent litigation based on the VPPA. The key challenge in these litigations is how to interpret the VPPA’s 1980s terms in light of today’s digital advances.
Features

While Federal Legislation Flounders, State Privacy Laws for Children and Teens Gain Momentum
For decades, the Children’s Online Privacy Protection Act has been the only law to expressly address privacy for minors’ information other than student data. In the absence of more robust federal requirements, states are stepping in to regulate not only the processing of all minors’ data, but also online platforms used by teens and children.
Features

A New Privacy Nuisance Suit Wave Gathers Strength In Arizona
Plaintiff’s lawyers struggling to find another nuisance suit cash grab in a desert of privacy laws without a private right of action appear to have found their oasis. Like a hiker desperate for water in the Valley of the Sun, plaintiff’s firms are desperately trying to tie a little-known state law to common email tracking pixel technologies. With the potential for class-action litigation and significant financial exposure, companies relying on these technologies must reassess their risk.
Features

How Secure Is Your Firm's AI System?
What Law Firms Need to Know Before Trusting AI Systems with Confidential Information As artificial intelligence continues to revolutionize industries, the legal profession is no exception. Every authority agrees about the transformative impact AI is having on legal services. As law firms and corporate legal departments adopt AI technologies to streamline their practices, they must face the inevitable question: How secure are these AI systems?
Features

California Supreme Court to Consider Reach of Two Data Privacy Laws
California's Supreme Court will consider the reach of two data privacy laws cited in a recent appellate case that found an education vendor potentially liable for a breach of student information.
Features

Addressing the Overlap Between AdTech and Third-Party Risk Management
Effective third-party risk management means data is being considered differently. There is an extra layer requiring management and response for data privacy. The landscape is complicated, but if organizations are proactive, and review obligations as soon as they are published, there will be less room for missteps.
Features

Legal Remedies Against Revenge Porn
Instant access to the internet has made sharing photographs online easy. Unfortunately, this has opened the door to revenge porn. Revenge porn is a serious violation of privacy that can have devastating consequences for victims. How might a victim of revenge porn counteract posts of compromising photographs to social media?
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- When Is a Repair Structural or Nonstructural Under a Commercial Lease?A common question that commercial landlords and tenants face is which of them is responsible for a repair to the subject premises. These disputes often center on whether the repair is "structural" or "nonstructural."Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›