Features
Parents May Be Liable for Child's Activity on Facebook
It's 10 p.m. Do you know what your children are posting online?
Features
To Correct or Not Correct Misinformation in Social Media
In June 2014, the FDA issued a draft guidance document on correcting independent third-party misinformation on social media. While the draft guidance is not legally binding, it offers insight on the implications of whether or not to correct misinformation.
Features
Cybersecurity Practices Booming In Era of the Breach
The cybersecurity woes of companies like Target and Sony in 2014 and Anthem last month have meant a busy start to 2015 for law firm data-privacy and security practices.
Features
<b><i>Online Extra</b></i> Ninth Circuit Agrees to Revisit Ruling in Model Rape Case
With urging from Facebook, Craigslist, eBay and others, the Ninth Circuit has agreed to reconsider a controversial ruling about website operators' duty to warn about potential harm by third parties.
Columns & Departments
Upcoming Event
SXSW Music Conference 2015 CLE Program. Austin, TX, March 20-21
Features
<b><i>Online Extra</b></i> Turning Cybersecurity Into a Serious 'Game of Threats'
The last few years have seen some creative new methods of getting businesses engaged in protecting their networks and data. PricewaterhouseCoopers has created a cybersecurity computer game. PwC's 'Game of Threats' walks businesspeople, playing either as a team of nefarious hackers or as a company being attacked, through the important decisions they have to make during a breach, in hopes of giving them a deeper knowledge of cybersecurity and its challenges.
Features
Viacom and Google Defeat Privacy Claims over Kids' Online Data
A federal judge in Newark dismissed multidistrict litigation against Google Inc. and Viacom Inc. in rejecting claims that the companies' online data collection violates the privacy of children under 13.
Features
Laying a Foundation for Integrated e-Discovery Systems
Typically, the production of data in litigation involves a series of disconnected actions involving several corporate or cloud-based systems. These disassociated e-discovery activities ' identify, preserve, collect, and track (IPCT) ' are then feed into a downstream set of processing, review, and production (PRP) steps often hosted outside the corporate firewall. Fortunately, technology advances are helping counsel and client alike to integrate systems and streamline processes both inside and across the firewall.
Features
e-Commerce Website Methods Are Patent Eligible
On Dec. 5, 2014, a divided Federal Circuit panel held that claims directed to systems and methods of generating a composite Web page combining certain visual elements of a "host" website with content of a third-party merchant were "necessarily rooted in computer technology in order to overcome a problem specifically arising in the realm of computer networks," and, therefore, were patent-eligible. However, the court cautioned that not all claims addressing Internet-centric challenges are patent-eligible.
Columns & Departments
Net News
In This Facebook Threats Case, No Wait for High Court <br>Judge Gives Go-Ahead To Facebook Privacy Suit<br>Appeals Court: No Privacy for Facebook Photo In Slip-and-Fall Case
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business AlliesPractical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.Read More ›
- Issues in Reverse Morals Clauses In Talent Influencer Contracts With Product BrandsThe next company general counsel to slide a morality clause across the desk for a celebrity or web influencer to sign shouldn't be surprised if that talent also whips out a morals clause, one to cancel the contract if the company's brand acts immorally.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›