Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Electronic communication and data storage have become integral to almost every aspect of our business and personal lives. Email communication, content streaming, social media, online commerce and a host of other services — along with the associated data collection and sharing — are so much a part of modern life that we often forget that the underlying digital infrastructure even exists, at least until it fails.
But that ubiquity comes with some associated risk. Each interconnected service we use increases our digital "footprint" — the trove of information about us (accurate or not) that is available online. In some cases we may explicitly agree to share that information, in others it may be collected without our knowledge, but absent extraordinary measures, information about us is constantly being collected, stored, indexed and shared. This includes not only personally identifiable information (PII) such as names, addresses, dates of birth and Social Security numbers, but also associated demographic and preference profiles, built up through the tracking of Web activity, online commerce, or even geolocation. While PII is often explicitly protected by laws or regulations, the associated profile data generally is not, and that information is often freely shared among connected services. This may be unsettling, but it is not illegal — it's simply part of the bargain we have made as an online society.
The problem arises when the system breaks. These services are designed for ease of use, but easy communication and transmission make mistakes (and malicious attacks) more costly and more likely. An Amazon account isn't much use without a linked payment method; mobile banking isn't possible without sharing a tax identification number; company emails will inevitably contain sensitive business information. But as we entrust more and more sensitive data to these services, they become fodder for unintentional disclosure, whether through inadvertence or breach.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
Businesses have long embraced the use of computer technology in the workplace as a means of improving efficiency and productivity of their operations. In recent years, businesses have incorporated artificial intelligence and other automated and algorithmic technologies into their computer systems. This article provides an overview of the federal regulatory guidance and the state and local rules in place so far and suggests ways in which employers may wish to address these developments with policies and practices to reduce legal risk.
This two-part article dives into the massive shifts AI is bringing to Google Search and SEO and why traditional searches are no longer part of the solution for marketers. It’s not theoretical, it’s happening, and firms that adapt will come out ahead.
For decades, the Children’s Online Privacy Protection Act has been the only law to expressly address privacy for minors’ information other than student data. In the absence of more robust federal requirements, states are stepping in to regulate not only the processing of all minors’ data, but also online platforms used by teens and children.
In an era where the workplace is constantly evolving, law firms face unique challenges and opportunities in facilities management, real estate, and design. Across the industry, firms are reevaluating their office spaces to adapt to hybrid work models, prioritize collaboration, and enhance employee experience. Trends such as flexible seating, technology-driven planning, and the creation of multifunctional spaces are shaping the future of law firm offices.
Protection against unauthorized model distillation is an emerging issue within the longstanding theme of safeguarding intellectual property. This article examines the legal protections available under the current legal framework and explore why patents may serve as a crucial safeguard against unauthorized distillation.