Features
Social Media Discovery
Because 'information that an individual shares through social networking websites like Facebook may be copied and disseminated by another,' the expectation that such information is private, in the traditional sense of the word, is not a reasonable one.
Features
Players' War Against Online Games They Use
The world of free online video games is a big business, including for some law firms. The games derive much of their revenue from a tiny sliver of users who pay real-world money for virtual currency to hasten their advancement or refill their pretend coffers. Plaintiffs in the string of suits claim that the games run afoul of various states' laws by running thinly veiled gambling enterprises.
Features
Prioritizing e-Mail Security in the Legal Sector
Data breaches and cyberattacks aren't new occurrences, but it can sometimes feel like they are. It's only in the last few years that we've seen these attacks make headlines more and more, increasing in both quantity and impact.
Features
CISA Passes: What It Means for Organizations and Their Data
The Cybersecurity Information Sharing Act (CISA) was passed by the Senate on Oct. 27, and while it still has a few hoops to jump through before it is enacted into law, the hotly debated proposed rules may considerably impact both those organizations holding sensitive data and the users to which that data belongs.
Features
Cloud Taxes: Are States Heading In Right Direction?
It is no surprise that several states and a few cities are looking to tax cloud computing transactions given the increasing popularity of the cloud among businesses.
Features
Counterfeiting on the Internet: A Growing Menace
While some trade on the "black market" or though in-person settings has always existed, the Internet has become the major facilitator of the trade in counterfeit goods. This is because it allows counterfeiters to directly reach consumers instead of having to work through complicit retail middlemen. The counterfeiters often work from countries where brands have limited ability to enforce their trademarks.
Features
<b><i>Online Extra</b></i> YouTube to Offer Posters Legal Support to Defend Fair Use of Videos
In a sign that YouTube may be willing to push back against indiscriminate allegations of copyright infringement, the company announced it will offer legal support, including covering court costs, to protect some videos on its site that it believes meet the standard of 'fair use' under copyright law but have been challenged with takedown notices.
Features
<b><i>Online Extra:</b></i> Google Pushes the Bounds of Fair Use ' and Wins
The U.S. Court of Appeals for the Second Circuit's decision in The Authors Guild v. Google ' a case that, the court said, "tests the boundaries of fair use" ' held that a Google database including millions of books was protected by fair use.
Columns & Departments
Movers & Shakers
A Collection of Moves in the Cybersecurity and Privacy Practice Areas
Features
<b><i>Online Extra</b></i> Anthem Fires Back at Data Breach Suit
Anthem Inc., the nation's second largest health insurer, has taken its first swing at narrowing litigation stemming from a major data breach affecting about 80 million customers.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- China Finalizes New Regulations to Relax Personal Data Exports from ChinaNearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.Read More ›
- 10 Steps Legal Departments Should Be Taking to Prepare for the SEC's Newly Adopted Cybersecurity Risk Governance Rule for Public CompaniesBy readying your company's cybersecurity program now to comply with the SEC's cyber rules, you will also arm your company with a better defense against cyberthreat actors, reduce the reputational harm that comes along with a cybersecurity incident and increase investor confidence in the company's cybersecurity program.Read More ›
