News & Analysis as of

Email

Bradley Arant Boult Cummings LLP

Does Your Cyber Insurance Cover Social Engineering Fraud?

Most policyholders are aware of the danger of losses from fraudulent instructions and invoices accomplished through what is known as “social engineering” or related methods. Often this is carried out by an email claiming to...more

Omnizant

Welcome Emails 101

Omnizant on

How strong is your virtual handshake? Your firm’s welcome email is basically your virtual handshake, so let’s make sure it’s rock solid. Welcome Emails 101: Say it simply, set their expectations, and add value. Most...more

Stoel Rives LLP

Document Preservation, Collection and Production Obligations

Stoel Rives LLP on

Whether a construction dispute is subject to arbitration or court litigation, the parties to the dispute will most likely engage in a process to exchange their project files, project-related emails, and a myriad of other...more

McGuireWoods LLP

The Surprising Danger of Including a Spouse on Email Communications

McGuireWoods LLP on

Most lawyers know that state statutes or common law doctrines often protect communications between spouses – although there is wide variation in such approaches. But there is a lurking danger that all of us should keep in...more

Jackson Lewis P.C.

Failure to Safeguard, Two Cyber Intrusions, and an $850,000 SEC Settlement

Jackson Lewis P.C. on

Virtually all organizations have an obligation to safeguard their personal data against unauthorized access or use. Failure to comply with such obligations can lead to significant financial and reputational harm. In a...more

Thomas Fox - Compliance Evangelist

Tone at the Top Week: Part 3-Email as a Strategic Compliance Tool

We continue our exploration of how CEOs and senior executives are uniquely positioned to drive home the importance of ethical behavior and adherence to compliance regulations. Today, we consider the humble email and how it...more

Ogletree, Deakins, Nash, Smoak & Stewart,...

German Federal Labor Court Ruling Facilitates Presentation of Evidence When Notice of Termination Is Served by Registered Mail

Germany’s Federal Labor Court (Das Bundesarbeitsgericht (BAG)) recently held that there is prima facie evidence that a so-called registered letter is generally posted in the mailbox within the usual local mail delivery times....more

BakerHostetler

We Talkin’ About Security. Or Are We? Another Look at the FTC’s Recent Settlement with Security Firm Verkada

BakerHostetler on

As we wrote about last week, the Federal Trade Commission (FTC) recently announced that it had entered a proposed settlement with video equipment surveillance company Verkada over the company’s alleged security failures....more

BCLP

Navigating a Security Incident - Communication “Dos” and “Don’ts”

BCLP on

Communication during a data breach is challenging in the best of circumstances, and control of information, especially early in a breach response, is critical. Below are some DOs and DON’Ts for communicating during a data...more

Cimplifi

Cracking the Code on Modern Attachments in eDiscovery

Cimplifi on

Modern attachments, in Google Workspaces and Microsoft Office, have long posed significant challenges in eDiscovery. They are not actual files attached to an email or message but are links pointing to files stored elsewhere....more

Proskauer on Privacy

Privacy Class Action Spotlight: Surge of Privacy Class Actions in Arizona Targeting Email Pixel Tracking

Proskauer on Privacy on

There has been a recent surge of privacy class action lawsuits under the Arizona Telephone, Utility, and Communication Service Records Act targeting the use of common email marketing analytics technologies. Defendants are...more

Bricker Graydon LLP

Scammers, SSNs, and Smelling Funny

Bricker Graydon LLP on

I was hanging out with my friend this weekend, both catching up on emails from a coffee shop. After a while, he turned to me. “Well sh*t. Looks like my social security number might be on the dark web.”...more

BakerHostetler

Data Security, Commercial Email and Employee Reviews Walk into a Bar...

BakerHostetler on

Sorry folks, there is no punchline here, but there are bottom lines from a settlement the Federal Trade Commission (FTC) announced last week. We discuss three today: (1) the FTC continues to mount broad investigations and...more

Foodman CPAs & Advisors

Email Scams Continue to Trick Taxpayers

On 7/16/24, the IRS warned taxpayers and tax professionals how email scams continue to aim to trick taxpayers by stealing sensitive tax and financial information. This information consists of passwords, bank account numbers,...more

Array

This Week in eDiscovery: The Cost of Securing Sensitive Data, Responding to Discovery Issues

Array on

Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of August 19-25. Here’s what’s...more

Smart & Biggar

Don’t take the bait: avoiding trademark phishing scams

Smart & Biggar on

The College of Patent Agents & Trademark Agents (CPATA) recently issued an alert regarding a surge in fraudulent emails targeting trademark owners. As is typical of these “phishing” scams, the emails often pressure recipients...more

Cadwalader, Wickersham & Taft LLP

Stop and Think Before You Hit Send August 2024 - A Note to My Younger Self – Today’s Thoughts, How To Respond to Criticism, Both...

It's me, Angie Batterson, and I am back with my latest edition of notes to my younger self. We all struggle with receiving criticism, and I wish I could tell you that eventually you will be perfect at handling it, but alas,...more

Array

This Week in eDiscovery: Email Preservation or Computer Fraud? Recording Meet-and-Confers

Array on

Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of August 12-18. Here’s what’s...more

Robson & Robson, P.C.

5 Tips For Writing Conflict Emails

Robson & Robson, P.C. on

Attorney Edward Robson shares five tips for writing conflict emails. He says you should keep your emails in context [02:00], write your email as if it will be seen by a judge or jury [04:15], refrain from admitting fault in...more

Blank Rome LLP

Navigating New Theories of Liability: Arizona’s Communication Service Records Act

Blank Rome LLP on

Introduction - In today’s digital landscape, the line between marketing analytics and privacy infringement vis-à-vis state privacy law is increasingly blurred. At the heart of this debate is the use of tracking...more

Array

This Week in eDiscovery: Concerns in Google Antitrust Case, Email Attachments and Privilege

Array on

Every week, the Array team reviews the latest news and analysis about the evolving field of eDiscovery to bring you the topics and trends you need to know. This week’s post covers the period of August 5-11. Here’s what’s...more

Kohrman Jackson & Krantz LLP

Victims of Concealed Online Attacks in Ohio Now Have More Time to File Suit

Last week, the Ohio Supreme Court ruled that victims of anonymous online attacks have an extension of time to file a lawsuit, holding that they can file a suit one year from date the targeted publication is discovered. This...more

Benesch

Oldies but Not Goodies - Plaintiffs Put New Digital Spin on Song-Beverly

Benesch on

Over the past few months, a wave of new lawsuits has been filed in California state court against online retailers alleging violations of California’s Song-Beverly Credit Card Act, Cal. Civ. Code § 1747.08 (“Song-Beverly”)....more

BCLP

Arizona Spy Pixel Class Action Litigation Update

BCLP on

Recently filed class action complaints allege that companies that utilize embedded trackers within emails, or “spy pixels” as the plaintiffs are calling them, violate Arizona law because they collect a “communication service...more

Womble Bond Dickinson

Inbox Overload: Massachusetts Lawsuits Target Online Retailers’ Email Collection

Womble Bond Dickinson on

The Massachusetts’ Consumer Privacy in Commercial Transactions Act (the “Act”) limits companies’ ability to request and collect personal identification information (“PII”) that is not required for a transaction. The Act does...more

1,638 Results
 / 
View per page
Page: of 66

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide