Features

Does the Auxiliary Aids Standard Apply To Websites?
<b><i>Gil v. Winn-Dixie Stores, Inc.</b></i><p>After years of demand letters, complaints and settlements, a website accessibility lawsuit under Title III of the Americans with Disabilities Act finally went to trial. The case is remarkable not just because it is the first of its kind to go to trial, but also because the court's opinion does not consider whether a website owner can employ alternatives other than WCAG 2.0 to make website content "accessible."
Features

Ransomware Attack on DLA Piper Puts Law Firms, Clients on Red Alert
By now, every managing partner has heard the warning: Law firms and their clients' sensitive information are a treasure trove for hackers.But the ransomware…
Features

5 Legal Consequences of Diving 'All In' on Social Media
<b><i>Companies and Lawyers Should Begin to Learn the Laws of Individual Platforms Before Trying to Apply National and Local Legal Concepts</b></i><p>Since the possibilities offered by social networks and their reach on consumers are unquestionable, companies must remember that important legal consequences exist between an online presence on social media and on a proprietary website. We look at a few key consequences of going "all in" with social platforms below.
Features

Are Your Post-Breach Forensic Reports Privileged?
<b><i>A Trend Is Emerging</b></i><p>The Central District of California recently joined the small growing list of courts that have held forensic reports created by outside security companies following a data breach are protected from disclosure in civil litigation in certain circumstances.
Features

WannaCry Attack Is A Wake-Up Call for Cyber Preparedness
The scope of WannaCry changed our perceptions of ransomware attacks. It made it clear that ransomware could reach a broad cross-section of computers worldwide, at essentially the same time.
Features

Asserting Damages for Data Piracy Under the CFAA
When a database is breached in one way or another, the results can be devastating. Many companies suffering this kind of loss turn to litigation, often under the Computer Fraud and Abuse Act, which prohibits improperly accessing a protected computer. There is, however, a growing consensus in the Second Circuit that recovery of certain forms of damages under the CFAA simply is not permitted.
Features

Netflix Dooming Need for Foreign Presales Deals
Foreign rights presales, which since the 1970s have been used by independent Hollywood producers to raise funds to get their movies shot, are quickly becoming a thing of the past. Credit Netflix for giving them a big shove out the door. So what does that mean for Hollywood's deal lawyers? Bigger rights deals — but fewer of them to go around.
Features

3 Steps to Ensuring Your AI Initiative Does Not Fail
The energy in the legal industry surrounding artificial intelligence (AI) is undeniable. Law firms are investing in innovation or undertaking experiments to test the viability of applying AI-enabled tools to various disciplines. Legal professionals are packing presentations to learn if, how and when the heralded disruption will impact their careers.
Features

GDPR Gets Real
A procrastinator's guide to overcoming technical challenges in GDPR compliance.
Features

Ransomware in Review: 8 Prevention and Response Tips for Your Organization
Electronic data is defining the business world, and with its benefits come many threats. Here's how experts think organizations should protect against ransomware.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- A 'Cloud Security Doctrine' for Law FirmsCloud computing may be here to stay, but is it truly safer than the solutions that it's outmoding? The Legal Cloud Computing Association (LCCA) thinks there's a path to greater security, publishing for law firms its first "Cloud Security Doctrine."Read More ›
- Artist Challenges Copyright Office Refusal to Register Award-Winning AI-Assisted WorkCopyright law has long struggled to keep pace with advances in technology, and the debate around the copyrightability of AI-assisted works is no exception. At issue is the human authorship requirement: the principle that a work must have a human author to be eligible for copyright protection. While the Copyright Office has previously cited this "bedrock requirement of copyright" to reject registrations, recent decisions have focused on the role of human authorship in the context of AI.Read More ›
- IP NewsFederal Circuit: PTAB Did Not Err In Finding That It Retained Authority to Issue Final Written Decision After Deadline Passed Federal Circuit: District Court Did Not Err In Finding That an Abbreviated New Drug Application Is Limited to the Uses Described ThereinRead More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›