Features
DOJ Issues New Rule Regulating Handling of Bulk Sensitive Personal Data
The DOJ has proposed a rule that would regulate certain transactions involving bulk sensitive personal data. The rule would implement a complex regulatory framework, with civil and criminal enforcement, that is similar to sanctions and export licensing regimes. It also implicates federal cybersecurity requirements, government contracting and CFIUS actions.
Features
Second Circuit Clarifies Video Privacy Protection Act
The Second Circuit’s decision is notable in that it signals a reversal of the recent trend of dismissals of VPPA claims in courts across the country and could trigger a significant increase in VPPA lawsuits. Although organizations have grappled with VPPA claims for several years, this decision is another red flag to organizations to take immediate steps and ensure compliance with privacy laws to mitigate the risks of VPPA claims.
Features
4 Steps to Safeguard Against Individual Liability for Data Security Failures
With cyberattacks on the rise and class actions arising from cyberattacks being filed at an increased rate, executives and board members increasingly face the risk of being individually targeted in lawsuits brought by class action plaintiffs and governmental bodies alleging individual liability for data security failures.
Features
NY Revised Cybersecurity Regulation Goes Into Effect: What You Need to Know
On November 1, significant revisions to the regulations enforced by the New York Department of Financial Services (DFS) — the state’s financial services regulator — went into effect. The DFS revisions create a long-arm provision in that the changes affect not only New York State companies, but also their affiliates, and therefore the revisions could have an impact far beyond New York State borders.
Features
Most Companies Don’t Honor Privacy Opt-Outs
Global privacy control lets computer users set privacy preferences in their browsers, automatically sharing those choices whenever users go to a site. It’s supposed to give individuals more control over their personal data, allowing them to opt in or out of cookie usage, data sharing, data selling and targeted advertising.But they only work if companies honor them. And in most instances, they don’t.
Features
Federal Judge Allows Public Nuisance Claims Against Social Media Sites to Go Forward
Social media took another hit Nov. 15 after a federal judge allowed most of the public nuisance claims brought by school districts in the addiction cases to move forward.
Features
The 2024 LTN Law Firm Tech Survey
The 2024 LTN Law Firm Tech Survey spoke with 30 technologists at top U.S. law firms to get a sense of what technology issues they faced over the past year, how their technology posture, policies and investments are changing, and their thoughts on technology’s impact on the future of the legal industry.
Features
Untangling the Costs of Cyber Breach Recovery (and Strategies to Avoid Overbilling)
As cyber threats (and their price tags) evolve, so must the strategies companies use to navigate breach recovery. The future of breach recovery lies in smarter, faster solutions — particularly AI-driven approaches that streamline data mining and ensure breach notification compliance without compromising security or inflating costs.
Features
Artist Challenges Copyright Office Refusal to Register AI-Assisted Work
While the Copyright Office has previously cited the "bedrock requirement of copyright" that that a work must have a human author to be eligible for copyright protection to reject registrations, recent decisions have focused on the role of human authorship in the context of AI.
Features
Deeper Dive: Preserving Ephemeral Messaging — Capture Data Before Its Ghosts Haunt Your Compliance
This article considers how an organization might consider handling information generally, through the lens of a specifically troubling subset of information: ephemeral messages.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- 'Huguenot LLC v. Megalith Capital Group Fund I, L.P.': A Tutorial On Contract Liability for Real Estate PurchasersIn June 2024, the First Department decided Huguenot LLC v. Megalith Capital Group Fund I, L.P., which resolved a question of liability for a group of condominium apartment buyers and in so doing, touched on a wide range of issues about how contracts can obligate purchasers of real property.Read More ›
- CoStar Wins Injunction for Breach-of-Contract Damages In CRE Database Access LawsuitLatham & Watkins helped the largest U.S. commercial real estate research company prevail in a breach-of-contract dispute in District of Columbia federal court.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- 'Weinstein' Clauses In Acquisition AgreementsThe purpose of a Weinstein clause is to provide assurance that the target company (including its officers and executives) is not a hotbed of sexual harassment or a ticking time bomb of claims waiting to explode. This article on drafting and negotiating Weinstein clauses should help entertainment and media deal teams balance these risks.Read More ›
- Issues in Reverse Morals Clauses In Talent Influencer Contracts With Product BrandsThe next company general counsel to slide a morality clause across the desk for a celebrity or web influencer to sign shouldn't be surprised if that talent also whips out a morals clause, one to cancel the contract if the company's brand acts immorally.Read More ›