Features
Social Media Discovery
Because 'information that an individual shares through social networking websites like Facebook may be copied and disseminated by another,' the expectation that such information is private, in the traditional sense of the word, is not a reasonable one.
Features
Players' War Against Online Games They Use
The world of free online video games is a big business, including for some law firms. The games derive much of their revenue from a tiny sliver of users who pay real-world money for virtual currency to hasten their advancement or refill their pretend coffers. Plaintiffs in the string of suits claim that the games run afoul of various states' laws by running thinly veiled gambling enterprises.
Features
Prioritizing e-Mail Security in the Legal Sector
Data breaches and cyberattacks aren't new occurrences, but it can sometimes feel like they are. It's only in the last few years that we've seen these attacks make headlines more and more, increasing in both quantity and impact.
Features
CISA Passes: What It Means for Organizations and Their Data
The Cybersecurity Information Sharing Act (CISA) was passed by the Senate on Oct. 27, and while it still has a few hoops to jump through before it is enacted into law, the hotly debated proposed rules may considerably impact both those organizations holding sensitive data and the users to which that data belongs.
Features
Cloud Taxes: Are States Heading In Right Direction?
It is no surprise that several states and a few cities are looking to tax cloud computing transactions given the increasing popularity of the cloud among businesses.
Features
Counterfeiting on the Internet: A Growing Menace
While some trade on the "black market" or though in-person settings has always existed, the Internet has become the major facilitator of the trade in counterfeit goods. This is because it allows counterfeiters to directly reach consumers instead of having to work through complicit retail middlemen. The counterfeiters often work from countries where brands have limited ability to enforce their trademarks.
Features
<b><i>Online Extra</b></i> YouTube to Offer Posters Legal Support to Defend Fair Use of Videos
In a sign that YouTube may be willing to push back against indiscriminate allegations of copyright infringement, the company announced it will offer legal support, including covering court costs, to protect some videos on its site that it believes meet the standard of 'fair use' under copyright law but have been challenged with takedown notices.
Features
<b><i>Online Extra:</b></i> Google Pushes the Bounds of Fair Use ' and Wins
The U.S. Court of Appeals for the Second Circuit's decision in The Authors Guild v. Google ' a case that, the court said, "tests the boundaries of fair use" ' held that a Google database including millions of books was protected by fair use.
Columns & Departments
Movers & Shakers
A Collection of Moves in the Cybersecurity and Privacy Practice Areas
Features
<b><i>Online Extra</b></i> Anthem Fires Back at Data Breach Suit
Anthem Inc., the nation's second largest health insurer, has taken its first swing at narrowing litigation stemming from a major data breach affecting about 80 million customers.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›