Features
Google Accounts to Kids May Harm Their Privacy
Recently, multiple media outlets reported that Google plans to offer accounts for their wide array of services to children under 13 years of age. While the details regarding this alleged plan have not been publicized, it has already created a lot of concern with multiple privacy advocates.
Features
Loud and Clear: FinCEN Demands a Culture of Compliance
The onslaught of civil and criminal enforcement actions against financial institutions for violating anti-money laundering and counter-terrorist financing laws has continued its brisk pace in the past few months, with enforcement of the AML provisions of the Bank Secrecy Act and the sanctions regulations administered by the Office of Foreign Assets Control showing no signs of slowing down.
Features
Efficient Review In a Time-Sensitive Government Investigation
Over the past 10 years, government investigations have become increasingly sophisticated in analyzing electronically stored information (ESI). Federal executive departments and agencies have made substantial investments in advanced analytical systems that help investigators and prosecutors filter voluminous amounts of incoming ESI. Respondents to Civil Investigative Demands (CIDs) must recognize that the information provided will be analyzed using these powerful tools.
Features
Cross-Border Cybercrime and the Cybersecurity Wars
The Home Depot data breach may be the largest in the U.S. yet, affecting not only millions of customers in the U.S., but also shoppers at its 180 stores in Canada. Home Depot said customers who shopped at its U.S. and Canadian stores as far back as April were exposed, meaning the breach extended for more than four months including the busy summer season.
Features
Collecting Social Security Numbers
In the first half of 2014, at least 96 significant data breaches were reported, compromising more than 2.2 million records. Of these breaches, at least 46 involved records that may have contained Social Security Numbers (SSNs). What the affected businesses may not know is that the mere collection of SSNs may have put them in violation of state laws, in addition to the liability they may now face for having failed to protect the SSN information.
Features
<i>Jancik v. Redbox Automated Retail</i>
Congress enacted the ADA "to remedy widespread discrimination against disabled individuals." The salutary effect of the ADA cannot be understated. However, many business owners and operators might, at the same time, rightly ask whether there are any limits to the Act's reach.
Features
Online Consumer Privacy
Online service providers often collect user data for marketing, which frequently includes sharing the information with third parties. Consumers and web users who find this transmission of data an invasion of privacy can, with the help of the plaintiffs' bar, sue under various privacy statutes for alleged damages arising out of this practice.
Features
Time to Upgrade 28-Year-Old Electronic Privacy Law?
Apple Inc., Google Inc. and Microsoft Corp. are putting new pressure on Congress to update a 28-year-old law that governs how the federal government can obtain U.S. citizens' electronic data.
Features
Social Media Invades and Modernizes Employment Practices
For employers, social media sites present a potential treasure trove of information on applicants, but mining this information for use in recruiting, hiring, firing and monitoring of employees is fraught with risk. Nonetheless, some studies show that 40% of employers search social media during the hiring process. While there are not currently any laws in the United States forbidding employers from gleaning information from social media, improper use can get them into trouble.
Features
Back to School
With schools back in session, now is the time for employers to review hiring, payment and scheduling practices for workers under the age of 18. The myriad federal and state child labor laws that employers must heed range from work permit requirements to the hours and type of work performed, all of which vary based on an employee's age and whether school is in session.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Generative AI and the 2024 Elections: Risks, Realities, and Lessons for BusinessesGenAI's ability to produce highly sophisticated and convincing content at a fraction of the previous cost has raised fears that it could amplify misinformation. The dissemination of fake audio, images and text could reshape how voters perceive candidates and parties. Businesses, too, face challenges in managing their reputations and navigating this new terrain of manipulated content.Read More ›
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- Authentic Communications Today Increase Success for Value-Driven ClientsAs the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›