Emerging Markets Law

Showing 5 posts in Social Media.

Unauthorized Computer Access, Without Service Interruption, May Be Cause for Action

In a case of first impression, the Eleventh Circuit has held that an employer need not show an interruption of service to prove actionable harm under the Computer Fraud and Abuse Act (CFAA) and other federal laws. This is good news for employers and potentially for others who suffer computer intrusions.

Continue reading Unauthorized Computer Access, Without Service Interruption, May Be Cause for Action ›

State Enforcement of COPPA, Federal Online Advertising Law

On September 13, 2016, the New York Attorney General announced settlements with four major US toy and media companies regarding their use of online tracking of children who use their websites. Viacom, Inc. (Nickelodeon), Hasbro, Inc. (My Little Pony), and Mattel, Inc. (Barbie, Hot Wheels, American Girl) are among the companies fined a collective $835,000 for violating the Children's Online Privacy Protection Act (COPPA).

Continue reading State Enforcement of COPPA, Federal Online Advertising Law ›

California Court Rules on Enforceability of Browsewrap Contract

Posted In Intellectual Property, Litigation, Social Media

Practitioners might jump to the conclusion that browsewrap contracts are always unenforceable when hearing about the decision of the California Court of Appeals in Long v. Provide Commerce, Inc., 2016 Cal. App. LEXIS 199 (Mar. 17, 2016) (hat tip: Professor Goldman), but a closer reading of the case reveals a more nuanced lesson.

You can find a great summary of the facts of the case here. In short, however, the plaintiff was unhappy with the quality of a product purchased from the defendant’s online store. Plaintiff filed suit, seeking to have the case certified as a class action. Predictably, the defendant moved to have the case dismissed and the arbitration provisions of the browsewrap “terms of use” enforced.

Continue reading California Court Rules on Enforceability of Browsewrap Contract ›

Cyber Hygiene: Upgrade Your Software, Too

Data security is a multi-part process for most organizations. Today's installment of cyber hygiene habits for 2015 reminds us that updating software is a critical step in securing our networks. 

Continue reading Cyber Hygiene: Upgrade Your Software, Too ›

Cyber Hygiene: Upgrade Your Hardware

This fourth installment in our cyber hygiene series will discuss the importance of hardware upgrades in maintaining corporate data security. As with all the best practices we recommend in this series, the idea behind protection is to avoid incidents where possible, mitigate damage if they occur, and have a defensible position or "storyline" if you suffer a dispute or investigation. 

Continue reading Cyber Hygiene: Upgrade Your Hardware ›

Stay Connected

Subscribe to blog updates via email

Contributors