Features
<b><i>Online Exclusive</b></i> Controversial Cybersecurity Bill Passes in House
Congress is once again pushing forward on a controversial bill to bolster the nation's cybersecurity, which could end up changing how law firms and their clients respond to online threats. The House passed the Cyber Intelligence Sharing and Protection Act (CISPA) on April 18, sending the legislation to the Senate. The bill would allow 'cybersecurity entities' ' an intentionally broad term that includes law firms and business that they represent ' to share cyber threat information'
Features
The NLRB's Assault On Companies' Social Media Policies
This article discusses the NLRB's views on social media policies, through two recent NLRB decisions, and the eyes of the NLRB's General Counsel and its Administrative Law Judges.
Features
Google Pays $7 Million to Settle Privacy Breach
A settlement was announced in charges against Google Inc. for collecting data from people's homes. Under the agreement, Google will pay $7 million to 38 states. The terms of the settlement were announced by Connecticut Attorney General George Jepsen, whose office led a privacy task force investigating Google for unauthorized collection of data using its 'Street View' vehicles. The company agreed to change its corporate practices regarding privacy.
Features
International e-Commerce and e-Discovery
This article focuses on the conflict between U.S. and EU discovery procedures, and offers some useful and practical advice for U.S. litigants who may face uncertain territory when seeking discovery abroad.
Features
<i>Online Exclusive:</i> Court Sends Mixed Signals As Marriage Arguments End
The U.S. Supreme Court on March 27 concluded its historic two-day scrutiny of the thorny issue of same-sex marriage, displaying wariness about ruling on the subject even as it appeared possible that the justices will strike down the federal Defense of Marriage Act (DOMA).
Features
Florida Legal Ethics Opinion Clears Way for Cloud Computing
Florida has become the latest state to weigh in on the legal ethics of cloud computing, joining other states that have done so in concluding that lawyers may ethically use cloud computing, provided they exercise due diligence to ensure that the cloud provider maintains adequate safeguards to protect the confidentiality and security of client information.
Features
The Murky World of Online Privacy
This article examines the compliance issues raised by California's Online Privacy Protection Act, and the FTC's recent changes to the federal Children's Online Privacy Protection Act, and what companies must do to ensure they are not in violation.
Features
Transmission Claims Under the Computer Fraud and Abuse Act
Given the allure of robust remedies in federal court, companies routinely plead CFAA unauthorized access claims ' in addition to state law causes of action for misappropriation and breach of contract ' against former employees who seek a competitive edge through the use of information misappropriated from their former employer's computer network.
Features
Cybersecurity Report Spotlights Risks to U.S. Business from China
Mandiant, a Virginia-based cybersecurity firm, gave America a wake-up slap across the face last month by detailing how Chinese military hackers are infiltrating U.S. companies. And on Feb. 20, President Barack Obama's administration responded by announcing a broad plan to fight the cyber theft of trade secrets that included diplomatic pressure to discourage it.
Features
FTC Closes Google Inquiry
The FTC closed its inquiry, requiring Google to license patents that are essential to the interoperability of electronic devices but securing minimal agreements on what many viewed as the heart of the case: Google's dominance in the search market.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- "Holy Fair Use, Batman": Copyright, Fair Use and the Dark KnightThe copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.Read More ›