BizTech Law Blog
What is the background on the Heppner decision?
On February 17, 2026, in the case of United States of America v. Bradley Heppner, No. 25 CR. 503 (JSR), 2026 WL 436479 (S.D.N.Y. Feb. 17, 2026), the United States District Court for the Southern District of New York (the “Court”) held that documents generated by the defendant with generative artificial intelligence (“AI”) through a publicly-available AI platform were not protected by the attorney-client privilege or work product doctrine.
Whether, when an end-user prompts and communicates with a publicly available AI tool or ...
The Cybersecurity Information Sharing Act of 2015 (“CISA”) expired yesterday on September 30, 2025.
Though Congress discussed renewing the statute prior to its expiration, CISA was not officially reauthorized by the federal government.
CISA was designed to encourage private organizations to share cybersecurity information with other private sector entities and the federal government through the Department of Homeland Security, aiming to strengthen overall monitoring capabilities and bolster collective defense against cyber threats. In particular, the statute ...
Choosing a college or university is one of the most important, and expensive, decisions students and families will ever make. Unfortunately, scammers know this too, and they are using fake websites to steal money and personal information from unsuspecting applicants.
Recently, Michigan Attorney General Dana Nessel issued a consumer alert warning about fraudulent websites that impersonate real colleges and universities. These sites are designed to look convincing but have no connection to legitimate institutions. Instead, they trick students into sharing sensitive ...
Whether you are the CEO of a big corporation working in the office six days a week or an analyst working remotely from home entering data, everyone is at risk of a cyber-attack. Despite the fact that all organizations, regardless of size, are at risk, few have preventative measures in place, or have even planned for how they would respond in the event of an attack.
When people think of the term "cybercrime", things like fraud and phishing scams commonly come to mind. Less known and discussed is the “DarkNet,” a digital underworld that is inaccessible to most and where illicit marketplaces exist for things like stolen identity information.