Features
In Light of Recent FTC Actions, Review Your Privacy Policy
The United States does not have comprehensive legislation addressing the privacy implications of the collection and use of geolocation data. However, the Federal Trade Commission (FTC) has used its enforcement authority under Section 5 of the FTC Act to regulate companies engaged in unfair or deceptive practices involving geolocation data.
Features
WhatsApp, Encryption and the Battle with Law Enforcement
It is widely accepted that much of today's communications are digital — and as a result, the encryption of data, the privacy laws governing that data, and the role that governments play when national security and law enforcement issues are at stake is a very hot topic.
Features
What Lawyers Can Learn from Uber, Redux
Lawyers need to know what the client wants and how to get them there before the process starts. Just like a driver who doesn't know exactly where he's taking his riders, a lawyer who isn't totally sure what a client wants — let alone how to get them there efficiently and effectively — is likely to end up with a client who is disgruntled.
Features
The Human Factor In Information Security
No one can deny that cyberattacks are the new norm. Such risks will increasingly challenge our ability to operate our businesses. In the world of cybercrime, everyone — from individuals to nation-states — is a target. However, some targets are more alluring than others.
Features
Supreme Court Rules on Design Patent Damages<br><i>Samsung Electronics Co. Ltd. et al. v. Apple Inc.</i>
On Dec. 6, 2016, the U.S. Supreme Court threw out a damages award of $399 million that Apple won against Samsung in an ongoing design patent dispute.
Features
What Lawyers Can Learn from Uber, Redux
Lawyers need to know what the client wants and how to get them there before the process starts. Just like a driver who doesn't know exactly where he's taking his riders, a lawyer who isn't totally sure what a client wants — let alone how to get them there efficiently and effectively — is likely to end up with a client who is disgruntled.
Features
Estate Planning for the Digital Afterlife
This article discusses the importance of accounting for digital assets in an estate plan, provides practical considerations for handling their disposition after death, and describes the current state of the law for the handling of digital assets after death.
Features
<i>Online Extra</i> <br>Are Google's Confidentiality Agreements Illegal?
A current Google Inc. employee has sued the tech giant over its rules for protecting confidential information, alleging they prohibit workers from whistleblowing or even just complaining to their spouse about their boss. Employment lawyers say that if the allegations in the complaint are true — a big if, of course — Google's rules may well be overly restrictive.
Features
The Human Factor In Information Security
No one can deny that cyberattacks are the new norm. Such risks will increasingly challenge our ability to operate our businesses. In the world of cybercrime, everyone — from individuals to nation-states — is a target. However, some targets are more alluring than others.
Features
<b><i>Online Extra</b></i><br>Chinese Nationals Charged With Hacking Firms to Steal M&A Info
Three Chinese nationals face federal charges for allegedly hacking into two major U.S. law firms in a scheme to trade on information about imminent mergers and acquisitions.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Restrictive Covenants Meet the Telecommunications Act of 1996Congress enacted the Telecommunications Act of 1996 to encourage development of telecommunications technologies, and in particular, to facilitate growth of the wireless telephone industry. The statute's provisions on pre-emption of state and local regulation have been frequently litigated. Last month, however, the Court of Appeals, in <i>Chambers v. Old Stone Hill Road Associates (see infra<i>, p. 7) faced an issue of first impression: Can neighboring landowners invoke private restrictive covenants to prevent construction of a cellular telephone tower? The court upheld the restrictive covenants, recognizing that the federal statute was designed to reduce state and local regulation of cell phone facilities, not to alter rights created by private agreement.Read More ›
