Features
Does the Auxiliary Aids Standard Apply To Websites?
<b><i>Gil v. Winn-Dixie Stores, Inc.</b></i><p>After years of demand letters, complaints and settlements, a website accessibility lawsuit under Title III of the Americans with Disabilities Act finally went to trial. The case is remarkable not just because it is the first of its kind to go to trial, but also because the court's opinion does not consider whether a website owner can employ alternatives other than WCAG 2.0 to make website content "accessible."
Features
Ransomware Attack on DLA Piper Puts Law Firms, Clients on Red Alert
By now, every managing partner has heard the warning: Law firms and their clients' sensitive information are a treasure trove for hackers.But the ransomware…
Features
5 Legal Consequences of Diving 'All In' on Social Media
<b><i>Companies and Lawyers Should Begin to Learn the Laws of Individual Platforms Before Trying to Apply National and Local Legal Concepts</b></i><p>Since the possibilities offered by social networks and their reach on consumers are unquestionable, companies must remember that important legal consequences exist between an online presence on social media and on a proprietary website. We look at a few key consequences of going "all in" with social platforms below.
Features
Are Your Post-Breach Forensic Reports Privileged?
<b><i>A Trend Is Emerging</b></i><p>The Central District of California recently joined the small growing list of courts that have held forensic reports created by outside security companies following a data breach are protected from disclosure in civil litigation in certain circumstances.
Features
WannaCry Attack Is A Wake-Up Call for Cyber Preparedness
The scope of WannaCry changed our perceptions of ransomware attacks. It made it clear that ransomware could reach a broad cross-section of computers worldwide, at essentially the same time.
Features
Asserting Damages for Data Piracy Under the CFAA
When a database is breached in one way or another, the results can be devastating. Many companies suffering this kind of loss turn to litigation, often under the Computer Fraud and Abuse Act, which prohibits improperly accessing a protected computer. There is, however, a growing consensus in the Second Circuit that recovery of certain forms of damages under the CFAA simply is not permitted.
Features
Netflix Dooming Need for Foreign Presales Deals
Foreign rights presales, which since the 1970s have been used by independent Hollywood producers to raise funds to get their movies shot, are quickly becoming a thing of the past. Credit Netflix for giving them a big shove out the door. So what does that mean for Hollywood's deal lawyers? Bigger rights deals — but fewer of them to go around.
Features
3 Steps to Ensuring Your AI Initiative Does Not Fail
The energy in the legal industry surrounding artificial intelligence (AI) is undeniable. Law firms are investing in innovation or undertaking experiments to test the viability of applying AI-enabled tools to various disciplines. Legal professionals are packing presentations to learn if, how and when the heralded disruption will impact their careers.
Features
GDPR Gets Real
A procrastinator's guide to overcoming technical challenges in GDPR compliance.
Features
Ransomware in Review: 8 Prevention and Response Tips for Your Organization
Electronic data is defining the business world, and with its benefits come many threats. Here's how experts think organizations should protect against ransomware.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- The Binding Effect of Plea Agreements In White Collar CrimesFederal plea agreements sometimes state explicitly that they are limited to that one office and do not bind other U.S. attorney's offices. In this article, we discuss the circuit courts' competing approaches to interpreting the binding effect of plea agreements and the Department of Justice policy.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›
- Issues in Reverse Morals Clauses In Talent Influencer Contracts With Product BrandsThe next company general counsel to slide a morality clause across the desk for a celebrity or web influencer to sign shouldn't be surprised if that talent also whips out a morals clause, one to cancel the contract if the company's brand acts immorally.Read More ›