Features
Data Encryption And the Law
This article discusses several of the pressing matters within the realm of data encryption, including: the Constitutional concerns that arise when an individual is forced by the government to divulge encrypted data; the recent disclosures in the press of government involvement with encrypted data; and the current global legal climate in which these issues are situated.
Features
<b><i>Online Extra</b></i> Social Media Privacy Laws and the Financial Industry
Many employers use publicly available Facebook pages, Twitter feeds, and other social media outlets as screening tools for job applicants. And they may also use them as a way to monitor employees. After all, a picture is worth a thousand words. A handful of employers, however, have pushed their due diligence even further than standard Internet searches.
Features
It's a Licensee Eats Licensee World. Or Is It?
With the predominance of Internet marketing now continuously eroding what might be considered the traditional geographic "territories" of different licensees, the potential for conflict only becomes more acute.
Features
Third Circuit Keeps Objective Standard to Weigh Facebook Threats
Prompted by a case involving threats made on Facebook, the Third Circuit has ruled the objective-intent standard for assessing threats still stands.
Features
Combating Big Data with a 'Facts First' Approach to e-Discovery
The ability to quickly identify relevant electronically stored information when litigation or regulatory action arises. This challenge has been significantly exacerbated by the arrival of "Big Data." This problem must be addressed holistically and aggressively with a combination of human intelligence, legal process and advanced information retrieval technology. Taken together, this approach represents a "Facts First" intelligence-gathering methodology that allows legal teams to identify, analyze and defensibly reduce ESI volumes.
Features
ICANN's Trademark Clearinghouse Sees Slow Initial Take-up
Later this year, the Internet is set to undergo a series of new and drastic changes with the first rollout of hundreds of new generic Top Level Domains (gTLDs). However, there is still a significant lack of participation from many top businesses that have yet to register and, as a result, are at greater risk of intellectual property infringement and potentially putting consumers at risk as well.
Features
Nine Key Steps In a Proactive Cybersecurity Review
Securing your company's network and protecting your valuable data is difficult enough in today's Internet-driven economy. But to be treated by regulators and courts like an accessory to the crime after you've been hacked is truly adding insult to injury.
Features
Bloggers Want Same Rights as Mass Media
Bloggers, claiming that no distinction exists between blogs and traditional media, are seeking protection afforded by the First Amendment rights previously reserved for traditional media outlets. However, most courts do not afford bloggers the same rights given to traditional media.
Features
Word File Types and Compatibility
This column addresses the new compatibility features of Microsoft Office Word 2013.
Features
e-Discovery Platforms Are Not All the Same
The value of e-discovery technology varies, depending on a number of factors, including the provider that is hosting the data, the quality of technical support and the nature of the matter at hand. For that reason, there is no single one-size-fits-all platform.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- Private Equity Valuation: A Significant DecisionInsiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.Read More ›
- Meet the Lawyer Working on Inclusion Rider LanguageAt the Oscars in March, Best Actress winner Frances McDormand made “inclusion rider” go viral. But Kalpana Kotagal, a partner at Cohen Milstein Sellers & Toll had already worked for months to write the language for such provisions. Kotagal was developing legal language for contract provisions that Hollywood's elite could use to require studios and other partners to employ diverse workers on set.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity LitigationWhile the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.Read More ›