Features

New Federal Privacy Legislation Has Legitimate Shot At Passing
For years, the business community has been calling for a comprehensive federal privacy law, frustrated with operating under a patchwork of sometimes-conflicting state laws. Now, Congress is considering one that's extremely wide-ranging and that observers say has a legitimate chance of passage.
Features

Privacy Risk Management & Data Minimization
Many organizations — from growing start-ups to mature, well-established companies — are struggling with the new reality of what it means to manage data in an era of digital transformation, exponential data growth, and expanding regulatory regimes focusing on data management and minimization.
Features

Washington My Health My Data Act FAQs: Data Subject Rights
Like so many other features of the MHMDA, data subject rights are deceptively complicated and have the potential to create significant administrative hurdles to getting it right. In this article, we examine the tricky issues in our MHMDA FAQs and take a deep dive into data subject rights.
Features

What Employers Need to Know About Employee Privacy
Many employers struggle with not only identifying what is private protectable information, but also how to safeguard that information while also protecting the company's own business interests. Given the increased costs of litigation, it is critical that employers understand their obligations under the law and how to strike a legally compliant balance between these competing interests.
Features

U.S. Regulators Lift the Curtain on Data Practices with Assessment, Reporting and Audit Requirements
The assessment and audit requirements of the new generation of state data protection laws will force U.S. companies to move beyond mere window dressing and instead require them to develop fulsome data protection programs.
Features

New Jersey Passes Privacy Law
The New Jersey law follows states, such as California, Texas, and Connecticut, who have enacted privacy laws, including broad laws addressing consumer data privacy, children's privacy laws, consumer health data privacy laws, and data broker laws.
Features

'Keyword Warrants' Pose Privacy Threat
The practice of seeking a "keyword warrant" is a technique of dragnet policing. A keyword warrant requires the production of all IP addresses for anyone who inputs a particular word or phrase into an internet search engine. The search results are then used to identify a device user.
Features

FTC Revises Children's Online Privacy Rule to Extend Parental Consent to Targeted Advertising
The Federal Trade Commission in January provided more details on its proposed changes to the Children's Online Privacy Protection Rule, underscoring the need for online operators to review and prepare to update their policies and procedures.
Features

United Kingdom Approves Online Safety Bill; Making Social Media Companies Responsible
The United Kingdom's Online Safety Bill makes social media companies responsible to prevent and remove illegal or dangerous content, including posts relating to terrorism, child exploitation, hate crimes or fraud.
Features

New Jersey Looks to Other States In Enacting Data Privacy Legislation
At this juncture New Jersey stands at a crossroad, with the Legislature facing important choices on the scope and terms of comprehensive privacy legislation that will have a dramatic impact on business operations as well as the individual rights of New Jersey residents.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- The Cost of Making PartnerMaking partner isn't cheap, and the cost is more than just the years of hard work and stress that associates put in as they reach for the brass ring.Read More ›