Avoid Drowning in Data
June 02, 2015
Data is a rich source for evidence in litigation and, for many companies, a valuable asset. What is less apparent, however, is exactly how to properly manage information and its privacy and security. However, over the past several decades, best practices have been developed for establishing and managing a comprehensive privacy, data protection and information governance program. This article summarizes those learnings to suggest an approach for how to design and run a program that is right for your company.
Browse, Click, Sign, Enforce?
June 02, 2015
Signing, dating and keeping a record of a paper contract are standard practice ' but what about those that are native to websites, mobile apps and other digital platforms, and use such language as "Terms of Use," "Terms of Service," "Privacy Policies" and disclaimers? How do you track who is agreeing to what and when they agreed?
<b><i>Online Extra:</b></i> FTC Sued Over Refusal to Disclose Data Security Policies
May 28, 2015
' The Federal Trade Commission (FTC) was sued last month for refusing to turn over information about how the agency decides to bring data security cases. The Freedom of Information Act suit by Philip Reitinger, a former Department of Homeland Security official who is now president of a cybersecurity company, comes as the FTC'defends its role as data security cop'in two ongoing cases. …
Monitoring Employee Social Media Activity
May 02, 2015
Last year, the Pew Center released its demographic data on social media usage. The data revealed that ' regardless of age, race, sex, education or income ' nearly 75% of all adults in the United States who use the Internet use social media. The time is ripe to examine the pros, cons and pitfalls of monitoring employee social media postings from a legal perspective.
The Internet User's Duty of Care
May 02, 2015
The duty one Internet user has to another has changed, particularly with respect to cyber-security and privacy. Negligence by Internet users has enabled hackers and creators of viruses to exploit computer systems and engage in crime and unwanted computer intrusions.
Big Data Rights Protection Found in Internet Copyright Law
May 02, 2015
The Big Data-Internet connection is evidenced by the fact that the Internet is required for most Big Data transactions, including collection, storage and dissemination. Most of Big Data's content consists of uniquely Internet-related elements, namely users' transactions, meta-tag applicators and Internet content providers.
Deritivative Cyber Litigation
May 02, 2015
Potential liability for data breaches has emerged as a major concern for businesses in the past few years as massive cyber-attacks are increasing, with companies that use or store private customer data electronically or use social media as part of their marketing strategy being the prime targets.
The Changing Face of Legal Research
May 02, 2015
Executing a powerful business development plan is a challenge every attorney faces. For attorneys at small firms and with solo practices, doing it without breaking the bank is one of the biggest hurdles to a thriving practice.