With the plethora of portable digital recording devices – hey everyone’s got one in their pocket or on their hip – this is no longer an issue for some undercover law enforcement action. Think conversations at work, spousal [...]
When you are starting your new exciting business, you want to develop your great product and get out into the market as quickly as possible, all the while keeping costs down.
However, at the same time, you will likely be [...]
A U.S. District Court in Brooklyn has dismissed two lawsuits against Facebook, one brought by families of victims of Hamas terror attacks, and the other brought by 20,000 Israeli citizens. The claims allege that Facebook provided [...]
It’s actually pretty easy to lose the attorney-client privilege protection when sharing documents online.
Section 512(c) of the Digital Millennium Copyright Act (DMCA) is largely responsible for the plethora of user-generated content on the Internet. Section 512(c) provides that a service provider (e.g., a website) will [...]
Kidnapping a person and demanding a ransom for the victim’s release is old school. Now the perpetrators can hack your network and either encrypt your data, lock screens or disable the network and demand a ransom for receiving an [...]
Last week the Federal Trade Commission (FTC) sent more than 90 letters to advertisers and influencers using Instagram reminding them of their obligations to disclose brand relationships in social media posts, in particular on [...]
On April 13th, in the northern district court of California, Craigslist was awarded $60 million in a data scraping case against real estate listing site Radpad (Craigslist, Inc. v. RadPad, Inc., No. 16-01856 (N.D. Cal. Apr. 13, [...]
Beginning in February, Google has been sending notices to app developers that Google intends to limit the visibility of (i.e., remove) Google Play Store apps that do not conform with Google’s current User Data policies. An app [...]
Source code escrows have always been a bit of a strange beast. Though, the idea is simple enough: if there is a vendor meltdown for mission critical software, then the licensee gets a delivery of the source code in order to [...]