Features
<b><i>Online Extra:</b></i> Survey: Privacy Professionals Well Paid, Differ in Regulated and Unregulated Industries
What does it mean to be a privacy professional today? As it turns out, it means that you're likely at manager or director level and comparatively well paid, and you also interact often with the information security, IT, legal, regulatory compliance and HR departments. However, it also means that your budget isn't where you'd like it to be and your staff may be too small ' especially if you're in government.
Features
Senate Cybersecurity Bill Vote Stalled Again
Following months of debate, the U.S. Senate has delayed voting on the Cybersecurity Information Sharing Act, S. 754 (CISA), ahead of its summer recess. As part of an agreement reached on Aug. 5, the Act will be back on the Hill this month and will carry a number of new amendments when it resurfaces.
Features
New Report Offers Statistics On Copyright Cases
Lex Machina, a legal analytics company that grew out of a project run by Stanford University's law school and its computer science department, has published a 37-page "copyright litigation report" developed from litigation data and court decisions covering thousands of copyright cases filed in U.S. district courts over the past five years. The report analyzes key filings, findings, judgment types, decisions, resolutions, damages and other data.
Features
Ashley Madison Data Breach Sparks Suits
Infidelity website AshleyMadison.com and its parent company Avid Life Media Inc. have been hit with a pair of class actions in Los Angeles federal court stemming from the site's recent data breach.
Features
Federal Circuit Expands Liability For Divided Patent Infringement
Having been urged to do so by the Supreme Court, the Federal Circuit recently expanded liability under 35 U.S.C. '271(a) for direct infringement of a method patent involving more than one actor (divided infringement).
Features
Uniting Legal, IT and Records Management
When organizations discuss ESI, it almost always revolves around three core groups: legal and/or compliance; records management; and, of course, IT. Despite the fact that they all are responsible for important business functions associated with this data, they are seldom on the same page.
Features
Gray Plant Mooty Fast-Tracks Investigations with Recommind's Technology
The practice of law is constantly evolving, thanks to emerging technologies on which businesses now rely. Fortunately, technology to support the legal profession has stepped up to this challenge, bringing automation to tedious processes.
Features
FTC, Federal Court Views on Fraud In Crowdfunding
In a release this summer, the FTC announced it had brought and settled its first case involving crowd-funding. The defendant raised more than $122,000 through Kickstarter to produce a Monopoly-like board game geared toward H.P. Lovecraft fans. According to the FTC's complaint, defendant used the Kickstarter proceeds to pay for personal expenses, including his move to Oregon. The settlement order should serve as a reminder that strong legal remedies at both the state and federal level are available to defrauded contributors.
Features
It's Time for a Data Protection Checkup
This article is part of a series based on the BakerHostetler Data Security Incident Response Report. It focuses on developing and maintaining an information governance (IG) program. Look for further installments in future issues.
Features
A Practical Primer On Production Format Requests
The electronic format that electronically stored information is produced in is a necessary component of e-discovery. This article offers a primer on production format issues by diagramming a template request in order to explain both the technical meaning and practical significance of the terms.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›