Features
Google Pays $7 Million to Settle Privacy Breach
A settlement was announced in charges against Google Inc. for collecting data from people's homes. Under the agreement, Google will pay $7 million to 38 states. The terms of the settlement were announced by Connecticut Attorney General George Jepsen, whose office led a privacy task force investigating Google for unauthorized collection of data using its 'Street View' vehicles. The company agreed to change its corporate practices regarding privacy.
Features
International e-Commerce and e-Discovery
This article focuses on the conflict between U.S. and EU discovery procedures, and offers some useful and practical advice for U.S. litigants who may face uncertain territory when seeking discovery abroad.
Features
<i>Online Exclusive:</i> Court Sends Mixed Signals As Marriage Arguments End
The U.S. Supreme Court on March 27 concluded its historic two-day scrutiny of the thorny issue of same-sex marriage, displaying wariness about ruling on the subject even as it appeared possible that the justices will strike down the federal Defense of Marriage Act (DOMA).
Features
Florida Legal Ethics Opinion Clears Way for Cloud Computing
Florida has become the latest state to weigh in on the legal ethics of cloud computing, joining other states that have done so in concluding that lawyers may ethically use cloud computing, provided they exercise due diligence to ensure that the cloud provider maintains adequate safeguards to protect the confidentiality and security of client information.
Features
The Murky World of Online Privacy
This article examines the compliance issues raised by California's Online Privacy Protection Act, and the FTC's recent changes to the federal Children's Online Privacy Protection Act, and what companies must do to ensure they are not in violation.
Features
Transmission Claims Under the Computer Fraud and Abuse Act
Given the allure of robust remedies in federal court, companies routinely plead CFAA unauthorized access claims ' in addition to state law causes of action for misappropriation and breach of contract ' against former employees who seek a competitive edge through the use of information misappropriated from their former employer's computer network.
Features
Cybersecurity Report Spotlights Risks to U.S. Business from China
Mandiant, a Virginia-based cybersecurity firm, gave America a wake-up slap across the face last month by detailing how Chinese military hackers are infiltrating U.S. companies. And on Feb. 20, President Barack Obama's administration responded by announcing a broad plan to fight the cyber theft of trade secrets that included diplomatic pressure to discourage it.
Features
FTC Closes Google Inquiry
The FTC closed its inquiry, requiring Google to license patents that are essential to the interoperability of electronic devices but securing minimal agreements on what many viewed as the heart of the case: Google's dominance in the search market.
Features
Awuah v. Coverall: What, If Anything, Does the Dicta Mean for State Regulators?
What exactly can a state regulator do with respect to arbitration clauses in franchise agreements? The answer appears to be, "The regulator cannot do much."
Features
Guide to Privacy Law Compliance
When you set out to design and implement a data privacy compliance program for an e-commerce company or other organization, you face a number of threshold decisions and preparatory tasks, including putting a person or team in charge of data privacy law compliance.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- Private Equity Valuation: A Significant DecisionInsiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity LitigationWhile the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.Read More ›
- What Does 2024 Hold for Cybersecurity?Our annual poll of experts on the trends and developments to watch out for in 2024 in AI, data privacy, cybersecurity, e-discovery and more.Read More ›