A study done at MIT found that 87% of the population in the U.S. could be uniquely identified by just three pieces of Personally identifiable information (PII): their five-digit zip code, gender and date of birth. This demonstrates that SSNs, while valuable, is not necessary to identify unique individuals.
- October 28, 2011Todd M. Haley
A Pennsylvania man who was indicted for making violent threats on Facebook is now challenging the constitutionality of the federal cyberstalking statute, arguing that the law criminalizes "pure speech" and is vague and overbroad.
October 28, 2011Shannon P. DuffyKeeping track of and complying with copyright laws can be difficult, especially for ISPs and social-media companies that provide services to a global market. Many countries have developed specific legislation to help protect such entities from liability relating to the activities of their users. Unfortunately, the laws are not uniform ' or are not interpreted consistently ' and therefore compliance requires knowledge of the nuances among them.
October 28, 2011Craig R. SmithIn early 2011, we began planning to move offices, prompting us to take stock of all our technology. We were running Windows XP and Office 2007 and could have stayed on Worldox GX, but GX2 included a feature called "Workspaces" which would help us supplement our author-based profiling system, thereby helping lawyers and staff to organize and find documents more readily. Thus, we began to build the case internally for upgrading to GX2.
September 29, 2011Russ Mazzaro and Susan ZaveskyResponding to Hart-Scott-Rodino Act Requests for Additional Information and Documentary Materials (more commonly known as "Second Requests") presents substantial challenges in assembling a comprehensive and complete production of requested information and documents from company archives.
September 29, 2011David J. LaingWhile attorneys understand the importance of client confidentiality, many are less concerned about data security. This can be a serious oversight, since law firms are becoming increasingly vulnerable to security breaches. As other industries such as healthcare, financial services and the government start to recognize the dangers of security breaches and deploy more stringent security measures, the hacker community has begun to eye the legal industry as low-hanging fruit.
September 29, 2011Charlie MagliatoThis article provides a checklist of best practices for both in-house and outside counsel to consider, discuss and monitor throughout the litigation to ensure confidence in the client relationship and the e-discovery process.
September 28, 2011Sophia Lee and Christine SoaresCloud storage is ideal for music. Music files are large enough to require substantial storage space, small enough to stream over relatively low bandwidth (such as a 3G wireless connection) and desirable to have available on mobile devices. Unsurprisingly, however, this business model brings with it various legal issues for the cloud storage provider.
September 28, 2011Stephen M. KramarskyBlogs, like traditional publications, may result in allegations of plagiarism, unauthorized use and defamation claims. And, as in the case of traditional publications, legal, technical and insurance options are available to reduce or eliminate blog-related difficulties for blog owners.
September 28, 2011Jonathan BickThanks to the Internet, e-closings (and traditional closings) have become quite streamlined. The most sophisticated deals are done in virtual deal rooms that allow multiple parties secure, controlled access to documents and procedures for signing the documents. But there is a definite negative impact.
September 28, 2011Stanley P. Jaskiewicz

