Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

The Impact of the Surge of Biometric Data Privacy Lawsuits Against Employers Image

The Impact of the Surge of Biometric Data Privacy Lawsuits Against Employers

Hanley Chew & Eric Ball

The growing acceptance of biometric data as a form of identification for employees means that many employers will likely have to face issues covered in state legislation in the immediate future.

Features

Internet Goods and Product Liability Image

Internet Goods and Product Liability

Jonathan Bick

The Internet's value arises in part from its ability to provide images, data and content quickly and at little cost. This ability results from the fact that Internet products — whether they be images, data or content — are each reduced to a digital format. Sharing products that have been so reduced may result in product liability.

Features

<i>Legal Tech:</i>Looking Ahead: 2018 Legal Technology Predictions Image

<i>Legal Tech:</i>Looking Ahead: 2018 Legal Technology Predictions

Jeff Ton

At law firms and legal departments, preparing for the new year should mean looking back at the last year and prioritizing revenue-driving activities, identifying strategies to grow your firm or company while mitigating risk and budgeting for new projects to meet client demands.

Features

Ransomware: What to Do When It Happens to You Image

Ransomware: What to Do When It Happens to You

Kiran Raj & Mallory Jensen

In the event that your company is the victim of a ransomware attack, this article provides steps to be taken as part of its response to such an incident. It is meant to be a helpful guide, but the best response generally will depend on different factors, including the scope and severity of the attack, availability of remediation measures, and business sensitivities.

Features

eSports Raise Labor Law Issues for Teams and Players Image

eSports Raise Labor Law Issues for Teams and Players

Brian D. Murphy

The preference of the parties involved, even if reduced to writing, is rarely determinative of employment status. Instead, the specifics of the relationship will govern.

Features

SEC's New Cyber Unit Moves to Tackle 'Scam' Coin Offering Image

SEC's New Cyber Unit Moves to Tackle 'Scam' Coin Offering

Ben Hancock

<b><i>In the First Enforcement Action Initiated By Its New “Cyber Unit,” the SEC Announced It Has Secured a Court Order to Freeze the Assets of Individuals Behind a “Scam” Initial Coin Offering</b></i><p>In the first enforcement action initiated by its new “Cyber Unit,” the Securities and Exchange Commission (SEC) recently announced it has secured a court order to freeze the assets of individuals behind a “scam” initial coin offering, or ICO. 

Features

<i>Online Extra:</i><br>Social Media: Questions of Admissibility And Ethics Image

<i>Online Extra:</i><br>Social Media: Questions of Admissibility And Ethics

Khizar A. Sheikh, Lynne Strober & Jennifer Presti

Social media evidence can be acquired both informally — through an attorney's own investigation or from the client — or more formally through the use of discovery and the rules of discovery. While each gives rise to practical and ethical issues, this section will focus on informal methods of acquisition.

Features

The Cyber Shot Across the Bow: Data Manipulation and GPS Spoofing Image

The Cyber Shot Across the Bow: Data Manipulation and GPS Spoofing

Michael Bahar, Bronwyn McDermott & Trevor J. Satnick

In September 2015, then-Director of National Intelligence James Clapper warned that the next "push of the envelope" in cybersecurity might be attacks that change or manipulate electronic information in order to compromise its accuracy or reliability. Two years later, we may now be seeing the beginning of such insidious attacks, in the context of GPS spoofing — a technique that sends false signals to systems that use GPS signals for navigation.

Features

Regulators Are Catching Up to Cryptocurrency and Blockchain Technology within the Financial Services Industry Image

Regulators Are Catching Up to Cryptocurrency and Blockchain Technology within the Financial Services Industry

Craig Nazzaro, Brad Rustin & John Jennings

<b><i>Part One of a Two-Part Article</b></i><p>As we head into 2018, cryptocurrency and blockchain will continue to be a top initiative for pioneers in the financial services industry. As with any innovation within the financial services industry, the regulators are never far behind and are doing their best to keep up. Those that enter this space will find that they also have to pioneer the controls to manage the regulatory risks this technology presents.

Features

Five Smart Steps to Prepare for GDPR Data Subject Rights Image

Five Smart Steps to Prepare for GDPR Data Subject Rights

Sonia Cheng, Eckhard Herych, & Richard MacDonald

Many corporations around the globe are preparing for May 2018, when Europe's General Data Protection Regulation (GDPR) enforcement kicks in. The regulation encompasses a wide range of nuanced privacy requirements that can be challenging to operationalize. In particular, requirements around the rights of European data subjects — which include the right to be forgotten and rights to access, rectification and objection to processing — will be some of the most difficult to address.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • "Holy Fair Use, Batman": Copyright, Fair Use and the Dark Knight
    The copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›