Features
Collecting Social Security Numbers
In the first half of 2014, at least 96 significant data breaches were reported, compromising more than 2.2 million records. Of these breaches, at least 46 involved records that may have contained Social Security Numbers (SSNs). What the affected businesses may not know is that the mere collection of SSNs may have put them in violation of state laws, in addition to the liability they may now face for having failed to protect the SSN information.
Features
<i>Jancik v. Redbox Automated Retail</i>
Congress enacted the ADA "to remedy widespread discrimination against disabled individuals." The salutary effect of the ADA cannot be understated. However, many business owners and operators might, at the same time, rightly ask whether there are any limits to the Act's reach.
Features
Online Consumer Privacy
Online service providers often collect user data for marketing, which frequently includes sharing the information with third parties. Consumers and web users who find this transmission of data an invasion of privacy can, with the help of the plaintiffs' bar, sue under various privacy statutes for alleged damages arising out of this practice.
Features
Time to Upgrade 28-Year-Old Electronic Privacy Law?
Apple Inc., Google Inc. and Microsoft Corp. are putting new pressure on Congress to update a 28-year-old law that governs how the federal government can obtain U.S. citizens' electronic data.
Features
Social Media Invades and Modernizes Employment Practices
For employers, social media sites present a potential treasure trove of information on applicants, but mining this information for use in recruiting, hiring, firing and monitoring of employees is fraught with risk. Nonetheless, some studies show that 40% of employers search social media during the hiring process. While there are not currently any laws in the United States forbidding employers from gleaning information from social media, improper use can get them into trouble.
Features
Back to School
With schools back in session, now is the time for employers to review hiring, payment and scheduling practices for workers under the age of 18. The myriad federal and state child labor laws that employers must heed range from work permit requirements to the hours and type of work performed, all of which vary based on an employee's age and whether school is in session.
Features
Criminal Subpoenas for Online Data
Never before has so much personal data been available anywhere but also completely outside the immediate control of the person who created it. Companies like Google and Facebook are the entities responding to government search warrants and subpoenas for individuals' personal information. Federal courts continue to struggle ' and sharply disagree ' over the scope of Fourth Amendment protections for this data.
Features
<i><b>Online Extra:</i></b>Facebook Fights to Snuff Out Privacy Suit
U.S. District Judge Phyllis Hamilton was set last month to be the latest jurist in the Northern District of California to grapple with how decades-old federal wiretapping laws apply to today's technology.
Features
Interpreting China's New Trademark Law
Despite China's quotas on film and TV program imports, and the country's aggressive content restrictions, the U.S. entertainment industry continues to look at the world's second largest economy as essential for expanding the international audience for U.S. productions. With that in mind, this article examines the first major amendments to China's trademark law in more than 20 years.
Features
Courts Conflict on Anonymous, Allegedly Defamatory Online Speech
Anyone spending 10 minutes on the Internet reading content is often assaulted by angry and coarse language supporting frequently outrageous opinions. The First Amendment concepts of free speech have reached either new highs or discouraging lows when dealing with opinions and blogs on the Internet. In this unrestricted environment, can individuals or businesses protect their reputations?
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The 'Sophisticated Insured' DefenseA majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.Read More ›
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- The Brave New World of Cybersecurity Due Diligence in Mergers and Acquisitions: Pitfalls and OpportunitiesLike poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.Read More ›
- Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric CodeIn an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.Read More ›
- Guidance on Distributions As 'Disbursements' and U.S. Trustee FeesIn a recent case from the Bankruptcy Court for the District of Delaware, In re Paragon Offshore PLC, the bankruptcy court provided guidance on whether a post-plan effective date litigation trust's distributions constituted disbursements subject to the U.S. Trustee fee "tax."Read More ›