Features
Cybersecurity Data Sharing Now Available To Law Firms
Law firms now have access to a platform that allows them to share data on cybersecurity threats anonymously.
Features
Online Impersonation Continues, With Varying Consequences
Online impersonation is defined in the New York Code provisions that prohibit the practice, as the act of impersonating another "under an assumed character with intent to obtain a benefit or to injure or defraud another." The foremost case brought under this law, <i>People v. Golb</i>, in many ways epitomizes the bizarre and highly esoteric reasons why someone chooses to impersonate another in the first place.
Features
Recent Challenges To the FTC's Data Regulation Authority
Early on in 2015, pundits were already predicting that the extent and number of data breaches from 2014 would severely pale in comparison to those that would occur in 2015. Inevitably, people across the country, victims, media, members of government, and even litigious-minded attorneys, are scrambling to determine what legal recourse exists to not only retroactively seek retribution, but also proactively enforce data security methods ' a task that is still at its nascent stages of development.
Features
<b><i>Online Extra:</b></i> Banks' Lawyers Balk at Target's Data-Breach Deal
Plaintiffs lawyers representing some banks and financial institutions caught up in Target's 2013 data breach say the $67 million deal struck last month between the retailer and Visa Inc. leaves their clients shortchanged.
Features
<b><i>Online Extra:</b></i> Apple Beats Back Privacy Suit Over iMessage Glitch
A federal judge in San Jose has refused to certify a class of former Apple customers who claim the company illegally intercepted their text messages as a result of a glitch in its iMessage system.
Features
<b><i>Online Extra:</b></i> Am Law 200 Firms Spending $7M on Cybersecurity Annually
With unfettered access to critical documents and information, law firms are an attractive target for hackers. Even when firms employ cutting-edge data security techniques, their possession of corporate data still multiplies the surface area of risk for that information. A recent survey of the Am Law 200, which tapped nearly one-third of firm CIOs for their experience, is showing the extent to which the highest grossing firms are spending to mitigate the risk associated with data security.
Features
<b><i>Online Extra:</b></i> Yelp Fends Off Suit Seeking Pay for Posters
Lawyers for Yelp Inc. scored a victory in August over plaintiffs who had demanded to be paid for reviews they posted to Yelp's website.
Features
<b><i>Online Extra:</b></i> Facebook Readies for Battle Over Biometrics
Facebook Inc. will have home court advantage in a trio of privacy class actions claiming the company violated an Illinois law governing the collection of biometric data with its 'tag suggestion' feature.
Features
Information Is Changing Law Firm Models
The standard law firm model that has been in effect for the better part of the last 20 years is becoming less viable, and the way law firms are run is undergoing a subtle, yet significant change, driven largely by information.
Features
CA Federal Judge Agrees TV Streaming Co. Qualifies for Compulsory License
Aereo Inc.'s copyright dispute with the major television broadcasters didn't pan out as the now-bankrupt streaming service had hoped. But after Aereo lost at the U.S. Supreme Court, competitor FilmOn X continued to fight. Now, a Los Angeles federal judge has moved FilmOn closer to winning its battle with broadcasters.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- 'Customary Operations' or A Vacant Building?Many times, courts are faced with the question of whether a loss location is 'vacant' under a commercial property policy when trying to determine if the building owner or lessee is conducting customary operations. This article explores various decisions across the United States as to what is considered 'customary operations,' thereby rendering the property 'vacant.'Read More ›
- Redefining Attorney-Client Collaboration with Technology That Delivers Greater ValueIf savvy law firm attorneys haven't done so yet, they should take this time to adjust their expectations and increase their comfort levels with new technologies, processes, and workflows. Going forward, their clients will expect the emphasis to be on relationships and outcomes, not billable hours.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Mixed Ruling in Jefferson Starship Band Name SuitWhat's in a rock band's name? Plenty, if you are talking about Jefferson Starship, which goes back more than 40 years, has had more than 30 members and was born from the 1960s psychedelic rock band Jefferson Airplane.Read More ›
- The Availability of Self-Help Evictions to Commercial LandlordsA landlord may re-enter leased commercial premises peaceably, without resorting to court process, in those states where it is permitted, if the right to do so is expressly reserved in a commercial lease, either a) upon the tenant's defaulting on the payment of rent or other lease terms, or b) upon termination of the lease or the tenant's abandoning the premises.Read More ›