Features
Are Search Engine Results Protected Speech?
Search-engine results have become the lodestar of the Web for most users. Whether the user constructs a narrowly-tailored query designed to exclude inapplicable results, or a broad search designed as an introduction to a given topic, the algorithmic apparatus fueling search engines will usually produce pertinent information. As a matter of fact, this article on search results was in part fueled by using results acquired from a search engine.
Features
Coping with Evolving Cybersecurity Rules
Cybersecurity and data protection, more than ever, are priority items for the government and private sector. The government has reacted by proposing legislative "fixes" that would require organizations to satisfy basic levels of cybersecurity protection and disclose breaches or face fines. Whether a mandatory compliance model will be effective given the rapid pace by which technology advances is unclear. It may be unrealistic to expect the government's legislative pace to keep up with hackers.
Features
IRS Guidance Reveals Federal Bitcoins Strategy
The IRS's March 25, 2014 declaration that bitcoins are property, not currency, is the final piece of the carefully-crafted Federal approach to bitcoin regulation which greatly differs from the approach of other sovereign nations.
Features
Reclassification of Obesity and Changes to The Manual of Mental Disorders
The Patient Protection and Affordable Care Act (ACA) is not the only health care challenge facing employers. Recent medical disease reclassifications are affecting a large portion of America's workforce, and the long-term impact is proving difficult to predict. These changes may result in an increased number of workers' compensation and ADA discrimination claims, but hopefully, they will also result in a greater emphasis placed upon prevention and treatment.
Features
Important Issues and Recent Developments in Wage and Hour Law
This article examines important legal and political developments affecting the FLSA and how they develop into the most commonly litigated employment claims in American federal courts.
Features
Maximizing Value
Directors of a leveraged company should begin to consider the implications of not being able to access traditional debt markets on appropriate terms. This article highlights the initial steps, questions and concerns typically facing a director in this new environment.
Features
Consumer Groups Decry FCC's Net Neutrality Proposal
Consumer advocates reacted with dismay to reports that the FCC plans to allow Internet service providers to charge companies a toll for faster access, while FCC Chairman Tom Wheeler defended the proposed rules as consistent with the underlying goals of net neutrality.
Features
S. Ct. Limits Restitution for Child Pornography Victims
A divided U.S. Supreme Court on April 23 limited the amount of restitution due to child pornography victims whose images are viewed by thousands over the Internet.
Features
How to Reduce Litigation Costs In the EDRM Continuum
The amount of data a company generates grows with each passing day. It is important to develop strategies to reduce the amount of data subject to discovery obligations while staying current with legal and technology trends. A strong partnership with a vendor and law firm using sophisticated data review and collection techniques is essential to navigating the discovery minefield in a cost-effective way that is also defensible and fully documented.
Features
Consumer Groups Decry FCC's Net Neutrality Proposal
Consumer advocates reacted with dismay to reports that the FCC plans to allow Internet service providers to charge companies a toll for faster access, while FCC Chairman Tom Wheeler defended the proposed rules as consistent with the underlying goals of net neutrality.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- Private Equity Valuation: A Significant DecisionInsiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity LitigationWhile the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.Read More ›
- What Does 2024 Hold for Cybersecurity?Our annual poll of experts on the trends and developments to watch out for in 2024 in AI, data privacy, cybersecurity, e-discovery and more.Read More ›