It's 10 p.m. Do you know what your children are posting online?
- February 28, 2015Jeffrey N. Rosenthal
In June 2014, the FDA issued a draft guidance document on correcting independent third-party misinformation on social media. While the draft guidance is not legally binding, it offers insight on the implications of whether or not to correct misinformation.
February 28, 2015Alan G. MinskThe cybersecurity woes of companies like Target and Sony in 2014 and Anthem last month have meant a busy start to 2015 for law firm data-privacy and security practices.
February 28, 2015Gina Passarella and David GialanellaWith urging from Facebook, Craigslist, eBay and others, the Ninth Circuit has agreed to reconsider a controversial ruling about website operators' duty to warn about potential harm by third parties.
February 27, 2015Scott GrahamSXSW Music Conference 2015 CLE Program. Austin, TX, March 20-21
February 27, 2015ALM Staff | Law Journal Newsletters |The last few years have seen some creative new methods of getting businesses engaged in protecting their networks and data. PricewaterhouseCoopers has created a cybersecurity computer game. PwC's 'Game of Threats' walks businesspeople, playing either as a team of nefarious hackers or as a company being attacked, through the important decisions they have to make during a breach, in hopes of giving them a deeper knowledge of cybersecurity and its challenges.
February 02, 2015Rebekah MintzerA federal judge in Newark dismissed multidistrict litigation against Google Inc. and Viacom Inc. in rejecting claims that the companies' online data collection violates the privacy of children under 13.
January 31, 2015Charles ToutantTypically, the production of data in litigation involves a series of disconnected actions involving several corporate or cloud-based systems. These disassociated e-discovery activities ' identify, preserve, collect, and track (IPCT) ' are then feed into a downstream set of processing, review, and production (PRP) steps often hosted outside the corporate firewall. Fortunately, technology advances are helping counsel and client alike to integrate systems and streamline processes both inside and across the firewall.
January 31, 2015Josh Alpern, James FitzGerald and Jim MittenthalOn Dec. 5, 2014, a divided Federal Circuit panel held that claims directed to systems and methods of generating a composite Web page combining certain visual elements of a "host" website with content of a third-party merchant were "necessarily rooted in computer technology in order to overcome a problem specifically arising in the realm of computer networks," and, therefore, were patent-eligible. However, the court cautioned that not all claims addressing Internet-centric challenges are patent-eligible.
January 31, 2015Clyde ShumanIn This Facebook Threats Case, No Wait for High Court
Judge Gives Go-Ahead To Facebook Privacy Suit
Appeals Court: No Privacy for Facebook Photo In Slip-and-Fall CaseJanuary 31, 2015ALM Staff | Law Journal Newsletters |

