Now Available: The April Issue of Our Socially Aware Newsletter
Welcome to Socially Aware
Socially Aware is devoted to the law and business of social media, proactively addressing emerging issues and keeping our clients informed of new developments. We cover fields such as artificial intelligence, privacy and data security, Section 230, intellectual property, and much more.
- The latest issue of our Socially Aware newsletter is now available here. In this edition, we explore the threat to U.S. jobs posed by rapid advances in emerging technologies; we examine a Federal Trade Commission report on how companies engaging in cross-device tracking can stay on... ›
Social Links: Burger King ad triggers Google Assistant devices; suits allege infringement of copyrights in content posted to social media; Twitter’s hidden “dislike” button
By: Aaron P. Rubin
Without Google’s permission, Burger King ended one of its television commercials with a statement designed to automatically cause Google Assistant devices to read a list of the Whopper’s ingredients out loud. Having passed the 1.2-billion-user mark, Facebook Messenger is now twice as popular as... ›Gloom Descends on This Year’s SXSW Interactive
For the third year in a row, Socially Aware co-editor Aaron Rubin and I attended SXSW Interactive , which arguably has become the premier annual gathering for the global tech community. But this year, SXSW Interactive had a very different vibe to it than... ›Overview of Ransomware Attacks
By: Aaron P. Rubin
In the most recent edition of his CyberSide Chat series, Socially Aware contributor Andy Serwin discusses ransomware attacks, including: the reasons why ransomware attacks are becoming more common; the types of ransomware attacks companies should prepare to address; and the strategies that companies can... ›Social Links: Twitter sues U.S. government to protect account holder’s ID; Minn. court orders Google to disclose users who searched crime victim’s name; Facebook targets revenge porn
By: Aaron P. Rubin
Twitter is suing the Department of Homeland Security in an attempt to void a summons demanding records that would identify the creator of an anti-Trump Twitter account. Facebook has joined the fight against the nonconsensual dissemination of sexually explicit photos online—content known as “revenge... ›N.Y.’s New Cybersecurity Regulations: What Financial Services Companies Need to Know
By: Nathan D. Taylor
With corporate data security breaches on the rise, the New York State Department of Financial Services (NYDFS) has adopted rules requiring financial institutions to take certain measures to safeguard their data and inform state regulators about cybersecurity incidents. Intended to thwart future cyberattacks and... ›Social Links: Instagram makes it easy to label content as “sponsored”; Facebook combats fake news; better firefighting through drones
By: Aaron P. Rubin
A court ruled that a particular 98-character tweet wasn’t sufficiently creative to warrant protection under German copyright law. Inspired by a recording posted to Snapchat of a physical attack on a 14-year-old boy, a California bill would make it illegal to “willfully record a... ›Delaware Paves the Way for Blockchain Technology
By: Spencer D. Klein
Blockchain has been a hot buzzword in tech circles for some time, and, increasingly, we’re seeing companies—even Fortune 500 companies—announce blockchain-related initiatives. One particular area of interest to corporations is the use of blockchain not for Bitcoin or other cryptocurrencies, but for the creation... ›Supreme Court Rules Cheerleading Uniform Designs Are Copyrightable
On March 22, 2017, the Supreme Court held in Star Athletica, LLC v. Varsity Brands that design elements of cheerleading uniforms may be protected under the Copyright Act. The 6-2 decision, written by Justice Thomas, clarified the scope of protection afforded to clothing designs... ›Overview of Emerging Cybersecurity Issues
In the most recent edition of his CyberSide Chat series, Socially Aware contributor Andy Serwin discusses emerging cybersecurity issues including: The need to strike a balance between the efficiencies of the Internet of Things and the increased cyberattack vulnerability that usually goes along with... ›