Features
Improving Mobile App Privacy
Companies that create and distribute mobile apps are under increasing pressure to protect user data. In 2013, the FTC and the California Attorney General each published privacy recommendations for mobile apps. Among other things, the FTC urges "privacy by design," advising companies to build privacy protections into apps from the outset.
Features
<i>Commentary</i> New Laws Needed To Protect Student Data
Students and schools around the country are utilizing new digital technologies in ways many people did not imagine at the turn of the century ' and those technologies offer great promise. Unfortunately, the current legal framework designed to protect student privacy and safety has not kept up with the rapid advancements that have been created by the Digital Age.
Features
Net Neutrality Falls by the Wayside ' Again
The FCC failed again in its attempt to regulate broadband Internet service providers. On January 14, a unanimous three-judge panel of the DC Circuit Court of Appeals decided that the FCC lacked the legal authority to write certain rules governing the management of data on the Internet ' popularly known as the "network neutrality" rules. The decision could leave companies such as Netflix Inc. and Amazon, Inc. facing higher charges for the fastest service.
Features
International Internet Law Suffers Growing Pains
In November, a European court ruling forced an American Internet service provider to remove content from servers located in the U.S. and block the transfer of content to European and Asian users. This ruling resulted from the Internet search results of an Englishman who asserted that his French Internet privacy rights make it illegal to distribute Internet images of an individual in a private space without that person's permission.
Features
The Expanding Role of the Audit Committee
The role the independent audit committee of a board of directors is becoming increasingly important as significant responsibilities shift to the board of directors.
Features
<b><i>Online Extra</b></i> Bill Limiting Online Data Grabs Clears California Senate
Over protests from the tech lobby, California senators passed legislation on Jan 30 that would limit what information online retailers can collect from their customers.
Columns & Departments
Case Notes
MA Federal Court Holds 'Economic Loss Doctrine' Does Not Bar Claim for Breach of Implied Warranty
Features
Cyber-Harassment Bill Clears NJ Senate Committee
A New Jersey Senate committee has signed off on legislation that would strengthen criminal penalties for harassment or bullying over the Internet.
Features
Meals and Entertainment Expenses
Meals and entertainment expenses are generally only 50% deductible, and provided the expenses are ordinary and necessary, have a business purpose and have proper documentation, there should be no issues surviving an IRS audit.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Strategic Uses of a Rule 2004 ExamWhile most bankruptcy practitioners are familiar with the basic concepts behind the Rule 2004 exam, some are less familiar with the procedural intricacies of obtaining, conducting, and responding to the exam ' intricacies that often involve practices and procedures adapted from civil discovery that are beyond the scope of pure bankruptcy practice. This article explains.Read More ›
- COVID-19: Economic Stimulus and SBA LoansA summary of information on the various provisions under the new federal economic stimulus package.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›