On February 10, 2025, President Donald J. Trump signed an Executive Order pausing enforcement actions under the Foreign Corrupt Practices Act (FCPA), citing concerns that excessive enforcement was harming American businesses...more
The Sixth Circuit’s January 2, 2025, decision in Ohio Telecom Association et al. v. Federal Communications Commission et al. may reshape the future of the Internet, delivering a significant blow to the concept of net...more
1/6/2025
/ Broadband ,
Chevron Deference ,
Communications Act of 1934 ,
Discrimination ,
FCC ,
Internet ,
Internet Service Providers (ISPs) ,
Loper Bright Enterprises v Raimondo ,
Net Neutrality ,
Popular ,
Regulatory Reform ,
SCOTUS ,
Statutory Interpretation ,
Telecommunications ,
Telecommunications Act ,
Title II
The rapid advancement of artificial intelligence (AI) technology has created new challenges that significantly disrupts established legal principles. One facet of AI, with a large potential for abuse, is its seamless...more
12/14/2023
/ Artificial Intelligence ,
Child Pornography ,
Copyright ,
Deep Fake ,
DMCA ,
Intellectual Property Protection ,
Machine Learning ,
Online Reputation ,
Personality Rights ,
Pornography ,
Removal ,
Revenge Porn ,
Search Engines ,
Social Media
The Federal Trade Commission (FTC) has reinforced its aggressive stance on enforcing antitrust laws by filing a federal lawsuit against Amazon on September 26, 2023. Seventeen other states have also joined in this legal...more
One of the asserted advantages of blockchain and cryptocurrency is their operation outside the commercial banking system. However, this very feature poses a challenge when cryptocurrency is stolen—or more accurately,...more
8/21/2023
/ Arbitration ,
Banking Regulators ,
Blockchain ,
Clawbacks ,
Crypto Exchanges ,
Cryptocurrency ,
Dispute Resolution ,
EFTA ,
Financial Institutions ,
Fraud ,
Liability ,
Popular
A consistent pattern emerges in data breach and cyber-attack cases when companies turn to their insurers for coverage after such incidents. Whether they possess specialized cyber insurance or not, insurers often decline...more
7/31/2023
/ Business Losses ,
Cyber Attacks ,
Cyber Insurance ,
Damages ,
Data Breach ,
Denial of Insurance Coverage ,
Employee Misconduct ,
Fraud ,
Insurance Claims ,
Medical Billing Codes ,
Personally Identifiable Information ,
Popular ,
Ransomware
Online threats and harassment pose a significant problem in today’s digital landscape. With the Internet’s global reach, the ease of publishing and posting content, and the potential for anonymity or lack of consequences,...more
Like most healthcare entities, Indiana’s Trinity Health collects, stores, maintains and uses a large volume of particularly sensitive information about patients and others, including Personally Identifiable Information (PII)...more
Only two months after a federal bill was introduced to ban TikTok nationwide, Montana has become the first U.S. state to officially ban TikTok from operating in the state. Governor Greg Gianforte signed S.B 419 into law on...more
5/22/2023
/ China ,
COPPA ,
Data Collection ,
Data Protection ,
Dormant Commerce Clause ,
Foreign Adversaries ,
Foreign Policy ,
Mobile Apps ,
National Security ,
Personal Information ,
Social Media ,
State Bans ,
TikTok
For almost nine years, Haitao Xiang, a Chinese national and U.S. resident, had worked for Monsanto, Co in St. Louis as a research application engineer specializing in hyperspectral imaging technology. As with most jobs of...more
5/18/2023
/ Appellate Courts ,
Border Searches ,
Confidentiality Agreements ,
Customs and Border Protection ,
Economic Espionage Act ,
Exports ,
Imports ,
Monsanto ,
National Security ,
Non-Disclosure Agreement ,
Theft ,
Trade Secrets
Lehigh Valley Health Network (LVHN) is a healthcare network based in Allentown, Pennsylvania, and serves eastern and northeastern Pennsylvania. On Feb. 6th of this year, LVHN was hit with a combination ransomware and...more
The rise of cyberattacks has led to a significant increase in the demand for cyber insurance policies. However, the insurance industry is struggling to keep pace with the ever-evolving threat landscape, which has resulted in...more
As technology evolves, so does the issue of revenge porn. Revenge porn is the non-consensual sharing of the nude image of another. Revenge porn can be criminally or civilly actionable, depending on the laws of the applicable...more
Companies are increasingly choosing not to pay ransom for ransomware and extortionware due to the growing associated risks. In fact, a recent report by crypto-crime analyst firm Chainalysis found that payments to threat...more
2/2/2023
/ Anti-Money Laundering ,
Audits ,
Cryptocurrency ,
Cyber Attacks ,
Cyber Crimes ,
Cyber Insurance ,
Cybersecurity ,
Know Your Customers ,
Office of Foreign Assets Control (OFAC) ,
Popular ,
Ransomware ,
Russia ,
SDN List ,
Securities and Exchange Commission (SEC) ,
Ukraine
Ransomware insurance coverage has become increasingly popular in recent years as the threat of ransomware attacks has continued to grow. However, despite the widespread adoption of this type of insurance, there are still...more
12/29/2022
/ Casualty Insurance ,
Coronavirus/COVID-19 ,
Damages ,
Data Breach ,
Federal Trade Commission (FTC) ,
Fraud ,
Hackers ,
Insurance Industry ,
Liability Insurance ,
OH Supreme Court ,
Popular ,
Ransomware ,
Software ,
Theft ,
Vulnerability Assessments
On Aug. 11, 2022, the Federal Trade Commission announced a Notice of Proposed Rulemaking regarding the collection, sharing and use of certain information which it refers to as “commercial surveillance data” and whether the...more
8/22/2022
/ Data Breach ,
Data Brokers ,
Data Collection ,
Data Privacy ,
Data Security ,
Federal Trade Commission (FTC) ,
FTC Act ,
General Data Protection Regulation (GDPR) ,
Notice of Proposed Rulemaking (NOPR) ,
Personal Data ,
Personally Identifiable Information ,
Popular ,
SaaS ,
State Privacy Laws
Despite your best efforts, you have been hit by ransomware. You are locked out of your system, and you can provide no services to your customers, clients or patients. From a business perspective, you need to get your system...more
8/19/2022
/ Cyber Attacks ,
Cyber Crimes ,
Cybersecurity ,
Data Breach ,
FinCEN ,
Force Majeure Clause ,
Hackers ,
NIST ,
Office of Foreign Assets Control (OFAC) ,
Popular ,
Ransomware
When the police, acting under the color of law, deprive a person of their civil or constitutional rights, the person generally has two remedies. First, if they are the victim of an unconstitutional search or seizure, a forced...more
INITIATING A LAWSUIT -
As our reliance on the internet grows, so do online scams. As a result, causes of action arising out of online activities are booming. People perpetuating online attacks frequently utilize...more
Cellphones have become a necessity for many people throughout the world, allowing convenience and interconnectivity in the palm of our hands – but they’ve also opened the door to a new type of theft. On April 26, the...more
On May 20, 2019, at approximately 4:52 p.m., a man walked into the Call Federal Credit Union outside Richmond, Virginia, pointed a firearm at the tellers, and threatened to kill them and their families unless he was given at...more
3/10/2022
/ Banks ,
Cell Phones ,
Criminal Investigations ,
FBI ,
Fourth Amendment ,
Google ,
Location Data ,
Personal Data ,
Probable Cause ,
Right to Privacy ,
Robbery ,
Warrants ,
Wireless Technology