Remove e-filing Remove e-records Remove State law
article thumbnail

The SEC Adopts Significant Cybersecurity Amendments to Reg S-P

Debevoise Data Blog

Since its initial adoption in 2000, Reg S-P has required broker-dealers, investment companies and registered investment advisers (“Covered Institutions”) [1] to adopt written policies and procedures to safeguard customer records and information (the “Safeguards Rule”) and to properly dispose of consumer report information (the “Disposal Rule”).

article thumbnail

Berkeley Technology Law Journal Podcast: Regulating IP in the Metaverse with Professor Molly Van Houweling

Berkley Technology Law Journal

Or even if you haven’t, it might just be technically difficult to get the files in order to insert them somewhere else. So, if what you’re doing by having this file on the server is not only sharing your copy but making an additional copy, that implicates the reproduction right, which is not subject to the first sale doctrine.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Are Electronic Signatures Legal?

Clio

Electronic signatures (or e-signatures) have become nearly ubiquitous in everyday life and business—from confirming your agreement to terms and conditions on a website, to using e-signature tools to sign a work contract. What is an e-signature? The ESIGN Act supersedes state laws that may conflict with the act’s provisions.

e-records 102
article thumbnail

The Tax Season Survival Guide for Law Firms

Lawmatics

In addition, the tax practitioners they work with must understand the specific accounting and tax concerns that lawyers and law firms have. “ “ Today, it takes more brains and effort to make out the income tax form than it does to make the income. ” — Alfred E. IRS Form 1065. IRS Form 1120.

article thumbnail

Observing the Black Box: Transcend’s Brandon Wiebe’s Insights into Governing Emerging AI Systems (TGIR Ep. 218)

3 Geeks and a Law Blog

And we saw at the time of recording this just last week, a very popular video communications tool, have an issue that arose around how they were processing data are how they stated they were processing data for their AI systems. Marlene Gebauer 30:01 So file this question under, you know, generative AI is replacing all our jobs.

article thumbnail

Observing the Black Box: Transcend’s Brandon Wiebe’s Insights into Governing Emerging AI Systems (TGIR Ep. 218)

Legal Tech Monitor

And we saw at the time of recording this just last week, a very popular video communications tool, have an issue that arose around how they were processing data are how they stated they were processing data for their AI systems. Marlene Gebauer 30:01 So file this question under, you know, generative AI is replacing all our jobs.

article thumbnail

A New Era of FTC Privacy and Cybersecurity Oversight: Top Ten Things Companies Should Know When Assessing FTC Compliance and Exposure

Debevoise Data Blog

16] As a general rule, CIDs are confidential and not publicly disclosed by the FTC during the investigation period unless the recipient voluntarily discloses the existence of the investigation or files a petition to quash. If disagreements remain, companies have the option of filing a petition to quash within 20 days after receipt of the CID.