Features

Ninth Circuit Allows Data Scraping from LinkedIn
The Ninth Circuit reaffirmed data analytics company hiQ Labs Inc.'s ability to scrape publicly available data from LinkedIn's platform despite the social media company's claim that the data collected violated federal hacking laws.
Features

SAG-AFTRA's Influencer Agreement and Waiver
For years, the legal framework governing the collaboration between influencers, advertisers and brands has been comparable to the Wild West, presenting multiple legal challenges to navigate. Influencer marketing exponentially grew when the COVID-19 pandemic drew performers to social media as the principal outlet to connect with their audience. As a result, SAG-AFTRA decided to venture into the fast-growing influencer market.
Features

The Slack Explosion: Convenient Yet Complicated
Part One of a Two-Part Series The informality of chat culture not only makes chat data harder to search, it also results in huge volumes of a new kind of data that must be processed in unique ways before it can be reviewed.
Features

Opportunities, Risks and Strategies In the Metaverse
While it is still unknown how the metaverse will take shape lawyers advising brands should familiarize themselves with the opportunities it presents, the risks involved, and strategies to consider for enhancing and protecting a client's brand.
Features

Brands In the Metaverse: Opportunities, Risks and Strategies
While it is still unknown how the metaverse will take shape, lawyers advising brands should familiarize themselves with the opportunities it presents, the risks involved, and strategies to consider for enhancing and protecting a client's brand.
Features

Slut-Shamed In the Workplace? Avoiding Exposure for Your Employees' Exposure
Situations involving an employee's voluntary online exposure rarely end well and can bring legal exposure for the employer.
Features

Biometric Law Litigation Expands Beyond Social Media
Social media has played an oversized role in lawsuits under state and local biometric privacy laws. Now, a New York City law that took effect in July is likely to significantly expand the range of biometric-related litigation beyond social media companies to a new group of defendants: retail stores, places of entertainment, and food and drink establishments.
Features

Emojis and E-Discovery
Emojis are an important aspect of everyday communication in 2021. Given their ubiquity, there should be little surprise that emojis have become a key source of evidence in civil and criminal cases.
Features

Preserving Snaps: Understanding Retention Features of Messaging Apps
The recent Doe v. Purdue University case out of the Northern District of Indiana — in which the court sanctioned plaintiff for failing to preserve relevant images and videos from his Snapchat application — teaches that counsel must understand the retention and deletion features of Snapchat and other messaging apps and social media if they are to help their clients preserve relevant ESI.
Features

Evolving Court Views on Content Embedding
Recent legal and procedural developments associated with the ubiquitous Instagram social media site have created significant practical and legal risks for both copyright owners and account holders that entertainment industry professionals should note.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- Risks of “Baseball Arbitration” in Resolving Real Estate Disputes“Baseball arbitration” refers to the process used in Major League Baseball in which if an eligible player's representative and the club ownership cannot reach a compensation agreement through negotiation, each party enters a final submission and during a formal hearing each side — player and management — presents its case and then the designated panel of arbitrators chooses one of the salary bids with no other result being allowed. This method has become increasingly popular even beyond the sport of baseball.Read More ›
- Private Equity Valuation: A Significant DecisionInsiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity LitigationWhile the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.Read More ›