Features

What Lies Beneath the Surface: The Dark Web
Nearly all of us access the World Wide Web on at least a daily basis. Yet for many of us, there is a fundamental lack of knowledge about the basic structure of the Internet and the way its different levels interact. This article provides a basic outline of the structure of the Web and some insight as to the purpose for and content housed on each level, as well as give some practical tips to avoid your company's data from ending up on the Dark Web.
Features

When Terms of Use Put 'Reasonably Prudent User' on Notice
On Aug. 17, 2017, the Second Circuit issued its decision in <i>Meyer v. Uber Technologies, Inc.</i>. The appeals court vacated and remanded the trial court ruling by holding that the registration process for Uber Technologies, Inc.'s mobile application formed a legal contract, Less than a month later, the Southern District relied on the <i>Meyer</i> decision in granting the defendant's motion to compel arbitration based on the fact that the design and functionality of defendant's amended terms of use placed plaintiffs' on "reasonably conspicuous notice" of the mandatory arbitration and jury trial waiver provisions.
Features

Trump's Tweets Are 'Official Statements'
President Donald Trump's tweets are official government statements, Justice Department lawyers told a federal judge last month.
Features

All Digital Assets Are Not Legally Equal
The Internet has generated a new set of assets known as "digital assets." Broadly defined, a digital asset is an electronic record in which an individual has a right or interest. This definition erroneously implies that digital assets should be treated as a legally equivalent set of assets when, in fact, failure to differentiate digital assets into one of three distinct classes will result in legal difficulties.
Features

Social Media: Questions of Admissibility and Ethics
<b><i>Part One of a Two-Part Article</i></b><p>This two-part article is divided into three sections: 1) Social media, defined; 2) Examples of how social media has been used in family law cases; and 3) Ethical considerations for attorneys who gather social media evidence.
Features

Procedures for Protecting Entertainment Domain Names Against Cybersquatters
Because there are so many new digital channels for possible intellectual property infringement, knowledge of the various mechanisms available to combat the issue is vital to enabling entertainment industry owners to protect their brand.
Features

Big Data, Web 'Scraping' and Competition Law
<b><i>The Debate Continues</i></b><p>Web "scraping" is one method of accumulating data that has sparked recent legal debate, both antitrust and otherwise. Legal challenges to Web scraping have involved privacy claims and claims under the federal Computer Fraud and Abuse Act, in addition to antitrust claims about the need to collect public data to be able to compete freely.
Features

FTC Moves Directly Against Social Media Influencers
The FTC has faulted social media influencers for failing to disclose the payments behind their seemingly organic endorsements. But the FTC only reached settlements with the companies, raising a question of when — if ever — the agency would directly go after the influencers.
Features

Website Accessibility: The Law and Your Business Priorities
The first step to solving a problem is knowing it exists. But many businesses have never thought to ask whether their customer-facing websites are accessible to people with disabilities, and only become aware of the issue when they are sent a demand letter or served with a lawsuit alleging that their site violates the Americans with Disabilities Act (ADA).
Features

What's the Deal with WhatsApp?
<b><i>Investigating and Discovering Mobile Device Data</b></i><p>Analyzing data from mobile devices is still uncharted territory for many in Legal and IT. Accordingly, today's modern legal and technology professionals need to brush-up on all things mobile. This includes understanding where applicable data resides in a mobile device and what common challenges are associated with accessing, preserving and extracting this data. One such app taking the mobile device world by storm is WhatsApp.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The 'Sophisticated Insured' DefenseA majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.Read More ›
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- The Brave New World of Cybersecurity Due Diligence in Mergers and Acquisitions: Pitfalls and OpportunitiesLike poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.Read More ›
- Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric CodeIn an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.Read More ›
- Guidance on Distributions As 'Disbursements' and U.S. Trustee FeesIn a recent case from the Bankruptcy Court for the District of Delaware, In re Paragon Offshore PLC, the bankruptcy court provided guidance on whether a post-plan effective date litigation trust's distributions constituted disbursements subject to the U.S. Trustee fee "tax."Read More ›