Features
Parents May Be Liable for Child's Activity on Facebook
It's 10 p.m. Do you know what your children are posting online?
Features
To Correct or Not Correct Misinformation in Social Media
In June 2014, the FDA issued a draft guidance document on correcting independent third-party misinformation on social media. While the draft guidance is not legally binding, it offers insight on the implications of whether or not to correct misinformation.
Features
Cybersecurity Practices Booming In Era of the Breach
The cybersecurity woes of companies like Target and Sony in 2014 and Anthem last month have meant a busy start to 2015 for law firm data-privacy and security practices.
Features
<b><i>Online Extra</b></i> Ninth Circuit Agrees to Revisit Ruling in Model Rape Case
With urging from Facebook, Craigslist, eBay and others, the Ninth Circuit has agreed to reconsider a controversial ruling about website operators' duty to warn about potential harm by third parties.
Columns & Departments
Upcoming Event
SXSW Music Conference 2015 CLE Program. Austin, TX, March 20-21
Features
<b><i>Online Extra</b></i> Turning Cybersecurity Into a Serious 'Game of Threats'
The last few years have seen some creative new methods of getting businesses engaged in protecting their networks and data. PricewaterhouseCoopers has created a cybersecurity computer game. PwC's 'Game of Threats' walks businesspeople, playing either as a team of nefarious hackers or as a company being attacked, through the important decisions they have to make during a breach, in hopes of giving them a deeper knowledge of cybersecurity and its challenges.
Features
Viacom and Google Defeat Privacy Claims over Kids' Online Data
A federal judge in Newark dismissed multidistrict litigation against Google Inc. and Viacom Inc. in rejecting claims that the companies' online data collection violates the privacy of children under 13.
Features
Laying a Foundation for Integrated e-Discovery Systems
Typically, the production of data in litigation involves a series of disconnected actions involving several corporate or cloud-based systems. These disassociated e-discovery activities ' identify, preserve, collect, and track (IPCT) ' are then feed into a downstream set of processing, review, and production (PRP) steps often hosted outside the corporate firewall. Fortunately, technology advances are helping counsel and client alike to integrate systems and streamline processes both inside and across the firewall.
Features
e-Commerce Website Methods Are Patent Eligible
On Dec. 5, 2014, a divided Federal Circuit panel held that claims directed to systems and methods of generating a composite Web page combining certain visual elements of a "host" website with content of a third-party merchant were "necessarily rooted in computer technology in order to overcome a problem specifically arising in the realm of computer networks," and, therefore, were patent-eligible. However, the court cautioned that not all claims addressing Internet-centric challenges are patent-eligible.
Columns & Departments
Net News
In This Facebook Threats Case, No Wait for High Court <br>Judge Gives Go-Ahead To Facebook Privacy Suit<br>Appeals Court: No Privacy for Facebook Photo In Slip-and-Fall Case
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›