Email

News & Analysis as of

Ashley Madison Fallout: Class Actions, Pentagon investigation and easily searchable data

We previously reported that hackers The Impact Team had posted legitimate detailed information about 36 million adultery website Ashley Madison users. In the wake of the shocking posting of the data last week, two class...more

EU Privacy Law May Require Individual Third Party Consent for Sale of Customer Email Lists

Parties to transactions involving personal data in Europe are well-advised to investigate whether individual consent or the offer of opt-outs are required to avoid the risk of fines and other sanctions imposed by the DPA or...more

Next on DOL’s Agenda: Mobile Device Use Outside Work Hours

It appears that the U.S. Department of Labor intends to remain busy through the rest of the summer. After releasing in June a Notice of Proposed Rulemaking seeking public comment on proposed changes to the Fair Labor...more

In-House Counsel Ordered to Sit for Additional Deposition After Emails Improperly Withheld on Basis of Privilege

Sprint Communications Company, L.P., filed a patent-infringement action against Comcast Cable Communications, LLC, Comcast IP Phone, LLC, and Comcast Phone of Kansas, LLC (collectively, "Comcast"). The district court had...more

Middle Market Company Focus: Avoiding Emails that Hurt or Embarrass Your Company

Email communication is vital to just about every business. But in-house counsel know that what employees write in an email can come back to haunt their company. Womble Carlyle attorney Meredith McKee and Carolinas...more

Failure to Prepare for Litigation Results in Adverse Inference Instructions (California)

NuVasive, Inc. v. Madsen Med., Inc., 2015 WL 4479147 (S.D. Cal. July 22, 2015). In this conspiracy theory case, the defendants filed a motion for sanctions against the plaintiff, alleging that the plaintiff engaged in...more

An Apple a Day May Increase Their Pay: Employees Seek Pay For Checking Emails After Hours

Hold the iPhone —a recent lawsuit by a group of Chicago police officers should have employers on high alert—at least those who permit, officially or not, non-exempt employees to do anything business-related on a mobile...more

Court Grants Sanctions In Light of Reckless Failure to Preserve (Delaware)

Kan-Di-Ki, LLC v. Suer, 2015 WL 4503210 (Del. Ch. July 22, 2015). In this breach of contract case, the plaintiff alleged that the defendant engaged in suppression and spoliation of evidence when the defendant deleted...more

DA Finds Digital Serial Meeting Created By Public Official Choosing to “Reply All”

A “reply all” email among public officials has led to a warning from prosecutors about Brown Act violations and serves as a reminder to keep open meeting laws in mind when talking online....more

Encryption: What is it, Why do it!

Encryption is a basic term used to describe the act of encoding data, files, and digital communications such that only those with the cipher could read or understand the information.  Think back to the decoder ring you got in...more

The e-Workplace: Balancing Employer and Employee Rights

Facebook. Twitter. LinkedIn. YouTube. Blogs. Email. Texts. Social media and the “E-Workplace” have become a fact of life for all employers. Companies have learned that these social media sites can be powerful marketing tools,...more

The 7 Deadly (Tech) Sins of Divorce – Part 1

For anyone involved in a divorce there are always pitfalls to be avoided, no matter where you are in the process. Some of the pitfalls are obvious, others less so. Today we’ll discuss the first three in a set of seven areas...more

E-Discovery Update: Nonresponsive Attachments – In or Out?

The Federal Rules of Civil Procedure state that "[p]arties may obtain discovery regarding any nonprivileged matter that is relevant to any party's claim or defense." Fed. R. Civ. P. 26(b)(1) (emphasis added). In electronic...more

OIG confirms Clinton sent classified emails through private account

The Office of the Inspector General for the State Department recently confirmed in a Memo that former Secretary of State Hillary Clinton sent emails with classified information in them through her private email account...more

Getting More Personal: California Amends Data Security Law

California’s data security statute will get a little more “personal” as of January 1, thanks to a recently-passed amendment revising the definition of covered personal information. On July 14 California expanded the...more

Texas Anti-SLAPP Law: The Expanding Scope of the Texas Citizen’s Participation Act – Part 2

It is easy to see how this applies to your straightforward defamation case assuming the defendant engaged in the “exercise of the right of free speech” which means “a communication made in connection with a matter of public...more

Cuba Si! Trade With Cuba … Not Quite Yet

There has been much fanfare surrounding the reestablishment of diplomatic relations with Cuba, starting with President Obama’s announcement of the resumption of bilateral relations, and followed by the formal establishment of...more

State Law Roundup: Legislatures Across the U.S. Revamp Data Breach Notification Laws

As the number of highly publicized data breaches continues to skyrocket and proposals for a federal data breach notification law stagnate, state legislatures around the country have been busy amending their own breach...more

FDA Final Rule Mandates Drug Manufacturer Notification of Impending Drug Shortages

On July 8, 2015, the federal Food and Drug Administration (FDA) published a final rule requiring drug manufacturers to report to the Agency any supply chain disruptions that could lead to drug shortages. The final rule...more

Court Follows Cost Shifting Analysis for Backup Tape Production (California)

United States ex rel. Carter v. Bridgepoint Educ., Inc., 305 F.R.D. 225 (S.D. Cal. 2015) - In this qui tam action claim case, the plaintiffs demanded that the defendants restore inaccessible ESI, specifically emails,...more

E-mail and Telephone Call Held Sufficient to Justify Exercise of Personal Jurisdiction

In Moncrief v. Clark (H040098, filed July 21, 2015), the California Court of Appeal, Sixth District, held that an out-of-state attorney’s phone call and e-mail to a California attorney, pertaining to a deal between their...more

Spoofing Whales: How Companies Can Protect Their CEOs and CFOs from the "Business Email Compromise”

Cyber scammers continually innovate new means to extract valuable information from unsuspecting victims. And a new form of cyber fraud is exploiting the close relationship between CEOs and CFOs. Identifying this threat — and...more

Why Social Media Matters

Not many born before 1990 would argue with the assertion that, in our lifetime, the Internet has changed just about everything. Here are a few examples: Postal mail (“snail mail”) is well on the way to obsolescence. The...more

Preservation by Backup Tape – Your First Five Questions . . .

This is the inaugural post in Discovery Advocate’s new series, “Your First Five Questions,” in which we identify a question commonly (or sometimes not so commonly) seen in practice followed by the first five questions you...more

PAC Upholds Board Action: No OMA Violation for Private Emails

In June, the Public Access Counselor (PAC) issued a non-binding opinion holding that board members of a school district did not violate the Open Meetings Act (OMA) when partaking in intermittent private email exchanges...more

379 Results
|
View per page
Page: of 16

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×