Features
The NLRB's Assault On Companies' Social Media Policies
This article discusses the NLRB's views on social media policies, through two recent NLRB decisions, and the eyes of the NLRB's General Counsel and its Administrative Law Judges.
Features
Google Pays $7 Million to Settle Privacy Breach
A settlement was announced in charges against Google Inc. for collecting data from people's homes. Under the agreement, Google will pay $7 million to 38 states. The terms of the settlement were announced by Connecticut Attorney General George Jepsen, whose office led a privacy task force investigating Google for unauthorized collection of data using its 'Street View' vehicles. The company agreed to change its corporate practices regarding privacy.
Features
International e-Commerce and e-Discovery
This article focuses on the conflict between U.S. and EU discovery procedures, and offers some useful and practical advice for U.S. litigants who may face uncertain territory when seeking discovery abroad.
Features
<i>Online Exclusive:</i> Court Sends Mixed Signals As Marriage Arguments End
The U.S. Supreme Court on March 27 concluded its historic two-day scrutiny of the thorny issue of same-sex marriage, displaying wariness about ruling on the subject even as it appeared possible that the justices will strike down the federal Defense of Marriage Act (DOMA).
Features
Florida Legal Ethics Opinion Clears Way for Cloud Computing
Florida has become the latest state to weigh in on the legal ethics of cloud computing, joining other states that have done so in concluding that lawyers may ethically use cloud computing, provided they exercise due diligence to ensure that the cloud provider maintains adequate safeguards to protect the confidentiality and security of client information.
Features
The Murky World of Online Privacy
This article examines the compliance issues raised by California's Online Privacy Protection Act, and the FTC's recent changes to the federal Children's Online Privacy Protection Act, and what companies must do to ensure they are not in violation.
Features
Transmission Claims Under the Computer Fraud and Abuse Act
Given the allure of robust remedies in federal court, companies routinely plead CFAA unauthorized access claims ' in addition to state law causes of action for misappropriation and breach of contract ' against former employees who seek a competitive edge through the use of information misappropriated from their former employer's computer network.
Features
Cybersecurity Report Spotlights Risks to U.S. Business from China
Mandiant, a Virginia-based cybersecurity firm, gave America a wake-up slap across the face last month by detailing how Chinese military hackers are infiltrating U.S. companies. And on Feb. 20, President Barack Obama's administration responded by announcing a broad plan to fight the cyber theft of trade secrets that included diplomatic pressure to discourage it.
Features
FTC Closes Google Inquiry
The FTC closed its inquiry, requiring Google to license patents that are essential to the interoperability of electronic devices but securing minimal agreements on what many viewed as the heart of the case: Google's dominance in the search market.
Features
Awuah v. Coverall: What, If Anything, Does the Dicta Mean for State Regulators?
What exactly can a state regulator do with respect to arbitration clauses in franchise agreements? The answer appears to be, "The regulator cannot do much."
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- When It Comes to Trademark Searches, AI Misses the MarkArtificial intelligence tools powered by large language models have become valuable resources in the trademark process. Despite incredible progress in natural-language reasoning, AI tools still face fundamental limitations when it comes to performing even basic trademark searches. Here are five important reasons why.Read More ›
