Features
Five Smart Steps to Prepare for GDPR Data Subject Rights
Many corporations around the globe are preparing for May 2018, when Europe's General Data Protection Regulation (GDPR) enforcement kicks in. The regulation encompasses a wide range of nuanced privacy requirements that can be challenging to operationalize. In particular, requirements around the rights of European data subjects — which include the right to be forgotten and rights to access, rectification and objection to processing — will be some of the most difficult to address.
Features
<i>Zeran v. AOL</i> and Its Inconsistent Legacy
<i><b>How the Seminal Fourth Circuit's Ruling Is Applied in Different Circuits</b></i><p>The rule of <i>Zeran</i> has been uniformly applied by every federal circuit court to consider it and by numerous state courts. And it has never been rejected in any precedential opinion. Indeed, it is perhaps a fitting tribute to the viability of <i>Zeran</i> that 20 year later the U.S. Court of Appeals for the Ninth Circuit, in its 12th opinion construing the CDA, barely spent even a sentence affirming dismissal of a defamation claim brought against Facebook over user content, pursuant to the CDA and the rule first developed in <i>Zeran</i>.
Features
What Lies Beneath the Surface: The Dark Web
Nearly all of us access the World Wide Web on at least a daily basis. Yet for many of us, there is a fundamental lack of knowledge about the basic structure of the Internet and the way its different levels interact. This article provides a basic outline of the structure of the Web and some insight as to the purpose for and content housed on each level, as well as give some practical tips to avoid your company's data from ending up on the Dark Web.
Features
When Terms of Use Put 'Reasonably Prudent User' on Notice
On Aug. 17, 2017, the Second Circuit issued its decision in <i>Meyer v. Uber Technologies, Inc.</i>. The appeals court vacated and remanded the trial court ruling by holding that the registration process for Uber Technologies, Inc.'s mobile application formed a legal contract, Less than a month later, the Southern District relied on the <i>Meyer</i> decision in granting the defendant's motion to compel arbitration based on the fact that the design and functionality of defendant's amended terms of use placed plaintiffs' on "reasonably conspicuous notice" of the mandatory arbitration and jury trial waiver provisions.
Features
Trump's Tweets Are 'Official Statements'
President Donald Trump's tweets are official government statements, Justice Department lawyers told a federal judge last month.
Features
Podcast: Phishing
Phishing is one of the more pervasive cyber attacks in the world, and while we've all received phishing emails, phishing attacks have become more sophisticated and come in different forms other than emails from Persian princes.
Features
All Digital Assets Are Not Legally Equal
The Internet has generated a new set of assets known as "digital assets." Broadly defined, a digital asset is an electronic record in which an individual has a right or interest. This definition erroneously implies that digital assets should be treated as a legally equivalent set of assets when, in fact, failure to differentiate digital assets into one of three distinct classes will result in legal difficulties.
Features
What Lies Beneath the Surface: The Dark Web
This article provides a basic outline of the structure of the Web and some insight as to the purpose for and content housed on each level, as well as give some practical tips to avoid your company's data from ending up on the Dark Web.
Features
SCOTUS Takes Up Microsoft Case on Email Privacy
A long-running dispute between Microsoft and the Justice Department over providing the government with certain customer emails in criminal investigations will be refereed by the U.S. Supreme Court.
Features
New-Wave Legal Challenges for Bitcoin and Other Cryptocurrencies
As the adoption of cryptocurrencies — or digital currencies that are encrypted for security — spreads throughout the business and financial sectors, so too do the concerns that lack of regulation render the new-age currency susceptible to fraud, manipulation, and to being used as a vehicle for money laundering. Nevertheless, recent efforts by U.S. enforcement agencies to apply and enforce financial regulations indicate that cryptocurrency-based transactions will be under greater scrutiny than ever before.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- The Binding Effect of Plea Agreements In White Collar CrimesFederal plea agreements sometimes state explicitly that they are limited to that one office and do not bind other U.S. attorney's offices. In this article, we discuss the circuit courts' competing approaches to interpreting the binding effect of plea agreements and the Department of Justice policy.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›
- The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business AlliesPractical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.Read More ›