The Future of Data Protection Enforcement: It’s Hammer Time!
January 01, 2025
The landscape of data protection and privacy continues to expand, and with that expansion comes increased scrutiny and the promise of increased enforcement. 2025 will mark a convergence of the proliferation of artificial intelligence, a growing understanding of and desire to exercise consumer rights and protections and new legislation, meaning increased regulatory enforcement is inevitable. This article explores the impending new legislative landscape, what increased enforcement may look like and how companies can prepare for optimal compliance.
Avoiding Legal Risks: Crafting a Strong Do Not Call Policy for Compliance
January 01, 2025
A strong Do Not Call Policy (DNC) is vital to comply with the Telephone Consumer Protection Act. Ensuring robust DNC compliance protects an organization's reputation and increases consumer trust. Below is a practical guide for building and implementing DNC policies that ensure compliance and reduce liability.
Exploring Gen AI’s Impact on Intellectual Property
January 01, 2025
For some, GenAI is the latest and greatest innovation, while for others, it is an existential threat. In this emerging technological landscape, there are many implications and unanswered questions regarding the protection of intellectual property rights. This article highlights some of the challenges GenAI presents, and recent developments in copyright law and trademark law in this quickly evolving space.
Will Law Firms Invest In AI In 2025?
January 01, 2025
Positive 2024 financials in Big Law will likely lead to more cash flow that should be available for law firm innovation, industry analysts say. In particular, law firm leaders are looking to 2025 to further leverage generative artificial intelligence to transform their business.
Protecting High-Profile Clients from Online Smear Campaigns
January 01, 2025
High-profile individuals facing litigation often face a dual battle: in the courtroom and the court of public opinion. The rapid pace of digital information sharing magnifies reputational threats, including smear campaigns, privacy violations, and cyberattacks, requiring swift and strategic intervention to protect personal and professional standing.
TikTok’s ‘Blackout Challenge’ and Section 230 Immunity
January 01, 2025
In Anderson v. TikTok, Inc., the Third Circuit held that the liability of an Internet Service Provider such as TikTok depended on whether TikTok was sharing content via the platform’s algorithm or engaged in something more. The question of whether TikTok’s recommendation algorithm transformed content into TikTok’s own expressive activity was not immunized by Section 230 and has disrupted the protection previously enjoyed by Internet platforms like TikTok.
Florida’s Digital Bill of Rights Joins the Regulatory Framework
January 01, 2025
The proliferation of data breaches and increased sophistication of criminal attack vectors has led more states to enact their own reasonable security provisions as part of the patchwork quilt of privacy laws. Nineteen of the U.S. states which have enacted comprehensive privacy laws along with Florida’s Digital Bill of Rights (which took effect summer 2024) have provisions requiring controllers and businesses to establish, implement and maintain reasonable administrative, technical and physical data security practices to protect the confidentiality, integrity and accessibility of personal data.
AI Poisoning: A Self Help Cybersecurity Option
December 02, 2024
A novel legal self-help technique to secure artificial intelligence data and programs is known as Poisoning AI. This technique involves modifying the AI algorithm to intentionally produce specific erroneous results.
DOJ Issues New Rule Regulating Handling of Bulk Sensitive Personal Data
December 01, 2024
The DOJ has proposed a rule that would regulate certain transactions involving bulk sensitive personal data. The rule would implement a complex regulatory framework, with civil and criminal enforcement, that is similar to sanctions and export licensing regimes. It also implicates federal cybersecurity requirements, government contracting and CFIUS actions.