Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
As convenient, useful and cool mobile technology and interconnected devices are, they come with risks that remain largely unseen or, worse, ignored. Some pose security risks, like those present in voice-activated devices that can access bank information, unlock doors, and control water temperature, and others pose privacy risks — especially for children. For manufacturers, they also pose regulatory litigation, and insurance risks, especially when children end up using their “smart” products. For example, California's recently passed Internet of Things cybersecurity law will be requiring “reasonable security features.”
In addition to data breaches involving this sensitive data — compromises that could follow a child through his or her entire life — one of the key laws that makers of IoT devices have to worry about is COPPA, the Children Online Privacy Protection Act.
Under COPPA, any company that collects information, directly or indirectly, must provide parents with detailed terms and conditions, allow parents to stop the company from gathering data at any time, take reasonable steps to safeguard the data, and delete the data once the purpose of the collection has been fulfilled.
Furthermore, the company is not allowed to distribute any child's information to any third party, with a few, limited exceptions.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
In Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?