News & Analysis as of

Data Privacy Social Media Social Networks

Epiq

Six Challenges When Collecting Social Media Artifacts for eDiscovery Litigation

Epiq on

Social media platforms are one of society’s primary communication channels, not just for personal interactions but also for business communications. Consequently, collecting social media artifacts for eDiscovery purposes is a...more

Robinson+Cole Data Privacy + Security Insider

Facebook Is Removing Some Sensitive Information from Public Profiles

Starting December 1, Facebook reportedly will remove several biographic details from user profiles, including “Religious views,” “Political views,” “Interested in” (indicating the user’s sexual orientation), and “Address.”...more

Fenwick & West LLP

Influencer Marketing: Top Business and Legal Considerations for 2020

Fenwick & West LLP on

Although influencer marketing is an ever-larger part of marketing budgets, questions have arisen about the longevity of influencers as a marketing channel. In addition, marketers are grappling with how to ensure that they and...more

Sunstein LLP

Exploitation of Publicly Available Website Data May be Unstoppable

Sunstein LLP on

Data scraping is a technique by which automated tools are used to extract data from a website and format the data for analysis. Many companies mine website users’ publicly accessible data in order to tailor products and...more

Akin Gump Strauss Hauer & Feld LLP

Top Tips for Reviewing Your Social Media Profile

Fifty-six percent of law school admissions officers say they look at an applicant’s social media profile to learn more about them, according to a survey by Kaplan Test Prep of 117 law schools. Ninety-one percent of law...more

Pillsbury - Internet & Social Media Law Blog

Would You Like Malware with Your Grumpy Cat Meme?

Social media companies like Facebook and Twitter have written “white papers” and devoted considerable resources to projects intended to create services that encourage trust and a sense of familiarity on the part of users....more

K2 Integrity

Cybersecurity Awareness: Limiting Your Exposure and Visibility

K2 Integrity on

We spend so much time on our mobile phones and on social media, yet often we don’t think of how these tools are broadcasting our lives as we work and play. With just a few steps, you can limit what you are digitally telling...more

Nossaman LLP

Ninth Circuit Issues Two Recent Decisions Further Definining Liability Under the Computer Fraud and Abuse Act

Nossaman LLP on

In July, the Ninth Circuit Court of Appeals issued two decisions by which it intends to clarify liability under the federal Computer Fraud and Abuse Act, 18 U.S.C. § 1030 (“CFAA”). The CFAA imposes criminal penalties and...more

King & Spalding

Coordinated Hackers Infiltrate 200 Targeted Employees’ LinkedIn Networks

King & Spalding on

Cybersecurity researchers at the Dell SecureWorks Counter Threat Unit (“Dell CTU”) uncovered a network of approximately 25 fake LinkedIn profiles that Dell CTU believes were used by an Iran-linked hacker group to establish at...more

Robinson+Cole Data Privacy + Security Insider

Social networking service, MeetMe, Inc., settles minors’ privacy violations for $200,000

On August 19, 2015, MeetMe, Inc. (MeetMe), a social networking website and mobile app, agreed to pay $200,000 and to change its privacy policies to settle a lawsuit alleging that MeetMe distributed teenagers’ geolocation and...more

10 Results
 / 
View per page
Page: of 1

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide