Features
Right-of-Publicity Claims and Advertiser Sponsored User-Generated Content Campaigns
This article concentrates on the scope of Communications Decency Act(CDA) immunity advertisers that operate user-generated content (UGC) campaigns may enjoy, limitations of the CDA in protecting against these claims and ways to structure UGC campaigns to minimize the risk of liability arising from unauthorized use of individuals' name, likeness and other personal attributes possibly included in UGC submitted as part of a sponsored UGC campaign.
Features
Illinois' Civil Union Act
Illinois is now one of 22 jurisdictions in the United States that extend some form of state-level spousal rights to same-gender couples.
Features
Avoiding Whistleblower Retaliation Claims Under the Dodd-Frank Act
This article provides an overview of the Dodd-Frank Act's whistleblower and anti-retaliation provisions, as well as practical steps to help employers avoid retaliation claims.
Features
<B><I>BREAKING NEWS:</b></i> <b>Facebook Settles with FTC over Privacy Violations</b>
Facebook has settled Federal Trade Commission charges that it deceived its users and failed to keep their information private, agreeing on Tuesday to establish a comprehensive privacy program that includes independent audits for the next 20 years.
Features
Coverage Issues Stemming from Med Pay Claims Under Commercial Premises Liability Policies
This article sets out the typical med pay policy language, summarizes certain coverage issues that have arisen in recent years with respect to med pay claims, and discusses two cases addressing whether an insurer can be liable in bad faith to an injured person for failing to provide med pay benefits.
Features
ISP Access to e-Mail Content Is Not Invasion of Privacy
An Internet Service Provider (ISP) can legally search the e-mail that it processes. ISPs may lawfully search the content of users' e-mails for many purposes, including assisting law enforcement, ensuring compliance with the ISP's terms-of-use agreement and protecting the ISP from legal difficulties, to name a few. Such activities do not currently constitute an invasion of the e-mail user's privacy.
Features
Companies and Lobbyists on Both Sides of SOPA
In mid-November, a number of corporations joined in the debate and lobbying over the Stop Online Piracy Act (SOPA), a new piece of legislation introduced in October by House Judiciary Committee chairman Lamar Smith (R-TX) that is being considered by that committee.
Features
Authentication of Social Media Evidence
Given the possibility of impersonation and digital fabrication in the online world, the information displayed on social media profiles is not immediately verifiable and presents issues of authentication and admissibility under the Federal Rules of Evidence.
Features
Companies and Lobbyists on Both Sides of SOPA
In mid-November, a number of corporations joined in the debate and lobbying over the Stop Online Piracy Act (SOPA), a new piece of legislation introduced in October by House Judiciary Committee chairman Lamar Smith (R-TX) that is being considered by that committee.
Features
Best Practices for Social and Mobile Media As Privacy Laws Evolve
As social media and mobile devices and apps continue to proliferate in the corporate enterprise, and e-commerce firms rely evermore on these technologies to assist promotion and sales, these forms of collaboration and information-sharing are putting a new spin on compliance issues.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Online Interviewing for Use in Lanham Act LitigationInternet interviewing will undoubtedly become the norm over the next decade. Being familiar with the ways to enhance its reliability and validity will be necessary to create scientifically valid, controlled, and reliable studies that can be used in Lanham Act litigation.Read More ›
- China Finalizes New Regulations to Relax Personal Data Exports from ChinaNearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.Read More ›
- Rights and Obligations In Patent LicensesThe owner of a commercially successful patent may have competing desires. On one hand, the patent owner wants to protect the patent and secure its maximum benefit; on the other hand, the patent owner wants to avoid enforcement litigation with competitors because it is expensive and puts the patent at risk.Read More ›