LexisNexis® Legal Newsroom
DHS might adopt Defense tech for border surveillance, and hire vets to run it

"Veterans returning from the Iraq and Afghanistan wars may find jobs operating satellite communications, blimps and other surveillance technologies stateside for border control, a Homeland Security Department official said Wednesday." - Nextgov, Nov. 15, 2011 .

The 'Googling Juror' Has Emerged As 'Massive Concern' In Courts

By William A. Ruskin In an on-line article titled, " Rely on Instructions to Curb the Socially Networked Juror " (3/19/12), Dr. Ken Broda-Bahm writes that "the 'Googling Juror' has emerged as a massive concern in the courts with plenty of stories on the process being thrown...

Technology Thought Leaders on the Bench

Written by Nadine Weiskopf, Director Product Management at LexisNexis A slow but steady movement has been gaining ground in our judicial system as technology is embraced more and more by members of the bench. Judges are attending technology conferences, finding ways to leverage technology in...

Every Cloud Has a Lining. Whether It's Silver or Not Depends on You

OK, we realize that our headline sounds like something we pulled from a fortune cookie, but that doesn't change the fact that when it comes to technology we are dealing with a couple of irritating realities. One is that technological innovation means we have to buy something new and feel stupid...

Troutman Sanders LLP: 'Facing' Reality: Facebook Knows What You Look Like

It's a bit odd to think that about whether you have a privacy right in what you look like. But as companies continue to gather enormous amounts of all kinds of data - including faces - and wrestle with whether they can monetize that data, the fear of "Big Brother" continues to spark debate...

Troutman Sanders LLP: Avoiding Legal Problems Created by Your Company Website (Part I)

In today's technology-focused age, commercial websites are ever more sophisticated and interactive, allowing customers to do far more than view and purchase a company's products. More and more businesses use social media outlets such as Facebook and Twitter to reach consumers and build brand...

Troutman Sanders LLP: Avoiding Legal Problems Created by Your Company Website (Part II: Gathering Information from Website Visitors)

By Troutman Sanders Part I of this post addressed the content that appears on your company website - both content you create or that was created for you and content generated by users of your website. Today, we will look at the various technologies for collecting information from users - often without...

Cowan, Liebowitz & Latman Announces Seminar on Fashion, Technology and the Internet

NEW YORK -- The law firm Cowan, Liebowitz & Latman will hold its ninth annual breakfast seminar for the Fashion Industry titled " Fashion, Technology & the Internet-Opportunities and Challenges " It will be held on Thursday, June 13, 2013 from 8:00 a.m. to 10:30 a.m. at the Harvard...

Peter S. Vogel: How to Avoid Cloud Contract Disasters

By Peter S. Vogel | A bad cloud contract can devastate any business, and a recent article “ 8 sure-fire ways to screw up a cloud contrac t” should be a wake-up call, but unfortunately many businesses learn the hard way. By way of example, a recent cloud contract that I negotiated contained...

Foley & Lardner LLP: Why Study the Draft 2014 National Nanotech Initiative Strategic Plan?

By Stephen B. Mathus The NNI has just released its 2014 draft Strategic Plan for public comment. Aside from the opportunity to submit comments, becoming familiar with the plan offers a number of benefits to nanotech ventures. One is that it provides a useful overview of the agencies involved, which...

Foley & Lardner LLP: Have Your Safeguards For Protecting Confidential Information Kept Pace With Your Next-Generation Manufacturing Processes?

Today’s next-generation manufacturing is marked by speed and technology. However, technology can be a double-edged sword. On one hand, technological innovations and advancements have resulted in a manufacturing resurgence in the United States. On the other hand, technology also makes confidential...

Cellphones

cellphones technology communication business tools

Immigration Policing and Federalism Through the Lens of Technology, Surveillance, and Privacy

"With the deployment of technology, federal programs to enlist state and local police assistance with immigration enforcement are undergoing a sea change. For example, even as it forcefully has urged invalidation of Arizona’s S.B. 1070 and similar state laws, the Obama administration has presided...

This Is Real Law: Expert Witness Malpractice: Making The Case For—And Against—Civil Liability

Captain Corcoran was never, never sick at sea. Well, hardly ever —as audiences familiar with Gilbert and Sullivan’s beloved 1878 comic opera H.M.S. Pinafore know so well. Indeed, they eagerly await the moment early in the opera when, challenged in song by his gallant crew, the ship’s...

Supreme Court: Police Can’t Search Cell Phones Without Warrant

WASHINGTON, D.C. — (Mealey’s) The police generally may not, without a warrant, search digital information on a cell phone seized from a person who has been arrested, the U.S. Supreme Court found today, ruling on two cases consolidated on appeal ( David Leon Riley v. State of California ,...

State Net Capitol Journal Spotlight: Issues Old And New Catch Fire In States

By Korey Clark Last week, we took a mid-year look at several of the issues we predicted last December would see a lot of action in statehouses this year. Here are a few more of those issues, as well as a couple of others that have heated up as the year has progressed. DIGITAL REVOLUTION/SHARING ECONOMY...

The “Uberization” of Jobs: Employee or Independent Contractor?

To not apply the possibly antiquated rules set forth in Borello to the new “share” economy could mean that thousands of new workers in California go without necessary protections The Uber business model could be a sea change in how many of us work and how we think about our jobs—think...

Ballard Spahr LLP: FFIEC Tool Helps You Assess Cyber Risk

The Federal Financial Institutions Examination Council (FFIEC) has released its long-awaited Cybersecurity Assessment Tool (Assessment) to help financial institutions identify the inherent risks faced by a company and determine the level of maturity of a company’s cybersecurity preparedness. The...

Keller and Heckman LLP Telecom Business Alert – 900 MHz Broadband, Drones, Net Neutrality, FirstNet, NG911, And Data Security

900 MHz Reallocation | Almost a dozen parties filed comments last week in response to the FCC’s Public Notice seeking input on a supplement to the Petition for Rulemaking filed jointly by Pacific DataVision, Inc. (PDV) and the Enterprise Wireless Alliance (EWA). The Petition seeks to realign...

Peter S. Vogel: Cyber Rewards – A New Concept In Airline Mileage Reward Program?

By Peter S. Vogel According to the Washington Post United Airlines “had rewarded two people with 1 million free miles of air travel each for discovering and disclosing software defects through the airlines “bug bounty” program…. so named because it offers bounties for the...

Peter S. Vogel: Cyberattacks on the Radar of Law Firms

By Peter S. Vogel With the help of the financial services industry “the legal sector has launched its own cyber-threat intelligence-sharing mechanism” known as the Legal Services Information Sharing and Analysis Organization (LS-ISAO) Services. The August 2015 Darkreading article entitled...

Peter S. Vogel: Mimecast Confesses that Cloud Mail Outage was DDoS Attack!

By Peter S. Vogel The Mimecast Incident Report stated that the US Data Centers and disruption of millions of emails were caused by a DDoS (Distributed Denial of Service) attack on September 21 from “10:46 am EST – 5:32pm EST.” The September 25, 2015 Incident Report summarized the...

Peter S. Vogel: Ransomware Alert: Client Data at Risk for Lawyers and Accountants!

By Peter S. Vogel The volume of Ransomware is increasing dramatically after malware is downloaded by unsuspecting employees “encrypts a user or company’s fi­les and forces them to pay a fee to the hacker in order to regain access to their own ­files.” KnowBe4 claims to be...

Peter S. Vogel: Is the Android Part of Google’s Antitrust Strategy?

By Peter S. Vogel The NY Times reported that “regulators are looking at whether Google unfairly uses the software to promote its other dominant services.” The report entitled “ F.T.C. Is Said to Investigate Claims That Google Used Android to Promote Its Products ” is based...

Peter S. Vogel: Cyber Theft of Millions Caused by Phishing Malware!

By Peter S. Vogel Criminal charges have been filed against the botnet administrator of “Bugat,” “Cridex” or “Dridex” which is a “sophisticated malware package designed to steal banking and other credentials from infected computers” and the “FBI...