Features
<b><i>Online Extra</b></i> DC, California Next Battlegrounds Over Online Streaming
Online television streaming company Aereo suffered a defeat last week in a New York federal court, but competitor FilmOn X is pressing on with similar fights against copyright lawsuits in Washington and California.
Features
<b><i>Online Extra</b></i> Redbox Prevails in Video Privacy Protection Act Appeal
A federal appellate court ruled last month that self-service movie kiosk company Redbox did not violate the Video Privacy Protection Act by giving an outside customer-service vendor access to its customer database.
Columns & Departments
IP News
Federal Circuit Applies <i>Alice</i> to Invalidate Online Transaction Patent <br>Federal Circuit Finds 'Unobtrusive' and 'Does Not Distract' Indefinite<br>Federal Circuit: In Hatch-Waxman, Infringement Based Only on Final ANDA Product
Features
The Brave New World of Internet Copyright Trolls
Copyright trolls are in the business of acquiring the right to bring lawsuits against alleged infringers and threatening to file copyright infringement claims in order to induce rapid settlements against large groups of defendants.
Features
Google Accounts to Kids May Harm Their Privacy
Recently, multiple media outlets reported that Google plans to offer accounts for their wide array of services to children under 13 years of age. While the details regarding this alleged plan have not been publicized, it has already created a lot of concern with multiple privacy advocates.
Features
Efficient Review In a Time-Sensitive Government Investigation
Over the past 10 years, government investigations have become increasingly sophisticated in analyzing electronically stored information (ESI). Federal executive departments and agencies have made substantial investments in advanced analytical systems that help investigators and prosecutors filter voluminous amounts of incoming ESI. Respondents to Civil Investigative Demands (CIDs) must recognize that the information provided will be analyzed using these powerful tools.
Features
Cross-Border Cybercrime and the Cybersecurity Wars
The Home Depot data breach may be the largest in the U.S. yet, affecting not only millions of customers in the U.S., but also shoppers at its 180 stores in Canada. Home Depot said customers who shopped at its U.S. and Canadian stores as far back as April were exposed, meaning the breach extended for more than four months including the busy summer season.
Features
Collecting Social Security Numbers
In the first half of 2014, at least 96 significant data breaches were reported, compromising more than 2.2 million records. Of these breaches, at least 46 involved records that may have contained Social Security Numbers (SSNs). What the affected businesses may not know is that the mere collection of SSNs may have put them in violation of state laws, in addition to the liability they may now face for having failed to protect the SSN information.
Features
Social Media Invades and Modernizes Employment Practices
For employers, social media sites present a potential treasure trove of information on applicants, but mining this information for use in recruiting, hiring, firing and monitoring of employees is fraught with risk. Nonetheless, some studies show that 40% of employers search social media during the hiring process. While there are not currently any laws in the United States forbidding employers from gleaning information from social media, improper use can get them into trouble.
Features
Criminal Subpoenas for Online Data
Never before has so much personal data been available anywhere but also completely outside the immediate control of the person who created it. Companies like Google and Facebook are the entities responding to government search warrants and subpoenas for individuals' personal information. Federal courts continue to struggle ' and sharply disagree ' over the scope of Fourth Amendment protections for this data.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- Private Equity Valuation: A Significant DecisionInsiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.Read More ›
- Meet the Lawyer Working on Inclusion Rider LanguageAt the Oscars in March, Best Actress winner Frances McDormand made “inclusion rider” go viral. But Kalpana Kotagal, a partner at Cohen Milstein Sellers & Toll had already worked for months to write the language for such provisions. Kotagal was developing legal language for contract provisions that Hollywood's elite could use to require studios and other partners to employ diverse workers on set.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity LitigationWhile the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.Read More ›