Features
Best Practices for Law Firms to Meet Cybersecurity Requirements of Inside Counsel
Whether or not your clients have suffered a data breach, cybersecurity is undoubtedly a critical concern. Many of your clients are actively searching for and plugging any gaps in their security. And if your clients haven't done so already, they're also going to focus their attention on what could potentially be an Achilles Heel for them ' their law firms.
Features
<b><i>Online Extra:</b></i> Pao Lawyers Slap Facebook With Discrimination Suit
A former Facebook employee is suing the company for gender discrimination and harassment, claiming her supervisor belittled her at work and asked why she 'did not just stay home and take care of her child.'
Features
<b><i>Online Extra:</b></i> Hulu Lawyers Land Punch in Privacy Suit
U.S. Magistrate Judge Laurel Beeler said she didn't want February's hearing in a privacy suit against Hulu LLC to feel like 'a wake.' But the Northern District of California judge put the case on life support, at the very least, indicating that she's leaning toward knocking out the remaining claims in a 2011 suit under the Video Privacy Protection Act.
Features
<b><i>Online Extra:</b></i> Judge Orders Litigious Adult Website to Pay $5.6 Million
A federal judge has ordered a litigious adult website to pay $5.6 million in attorney fees and costs under the Copyright Act, saying its motives for suing Giganews Inc. and Livewire Services Inc. had more to do with creating a tax write-off for its owner than with protecting its copyrights.
Features
<b><i>Online Extra:</b></i> New Russian Data Residency Law Will Soon Take Effect
There is a new Russian data residency law that will likely impact many companies, which somehow have business connections with Russia.
Features
When Your Data Goes Viral
As discussed in Part One of this article, a data breach can jeopardize a company's confidential information such as client records, trade secrets, privileged legal information, or employee records. Although many associate data breaches with hackers or cyberattacks, human error, such as a mistake in computer coding or losing a company laptop, also results in significant breaches.
Features
With Highly Anticipated Copyright Decision, The AutoHop Litigation Is Coming to a Close
In 2012, DISH Network announced two novel product offerings that would result in considerable backlash from the four major broadcast television networks and set in motion a three-year, wide-ranging, multi-front battle with the networks. As the dust now begins to settle, the copyright litigation has resulted in important precedents that will help define the boundaries under the Copyright Act for the multi-channel programming distribution industry.
Features
Federal Judge Rules For Defendant in Porn Copyright Case
An anonymous <i>pro se</i> defendant has beaten copyright infringement claims brought against him in federal court by a maker of pornographic videos. The defendant's victory runs counter to the result in a similar case in front of a different Eastern District judge.
Features
How to Obtain Social Media Data For Defending Lawsuits
Obtaining social media user content under most circumstances is extremely difficult ' unless you use the correct strategy. Simply sending discovery requests without a basic understanding of the information available is a fool's errand. It is pivotal that a practitioner who wants to conduct formal discovery of social media user content understand how each site stores and communicates its data.
Features
After Anthem, Diagnosing the Health of Data Security
Companies have begun to experience attempts to breach their databases on a frequent basis, and have had to become hypervigilant about protecting their networks against hackers. But once every couple of months, the bad guys get through the defense systems in a big and highly publicized way, showcasing data disaster for company and customers. This was the case in early February when Anthem Inc., the second-largest health insurance company in the U.S., announced it had been hacked.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›