Call 855-808-4530 or email GroupSales@alm.com to receive your discount on a new subscription.
Since the passage of UETA and ESIGN in 1999/2000, I have been fascinated as to exactly how the legal terminology of these and other “digital security” statutes equates to actual cryptographic methods. When someone writes a piece of software that “meets and/or exceeds these requirements,” and are “warranted for compliance” under these acts, how do contracting officers, lawyers, judges and everyone involved understand? It isn’t quite like a set of map directions: it’s difficult to draw a straight line from act to software function. As the digital landscape continues to grow and expand in scope, how does the legal profession keep up?
By Laura Jehl, Robert Musiala, Linda Goldstein, Fernando Bohorquez and Amy Mudge
While inflated expectations abound, the advertising industry is emerging as one of the more immediate, substantive and compelling use cases for blockchain technology.
By Thomas McThenia and Richard Markow
Like poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.
By Michael Bahar and Kristen Bertch
Technologies are often pitched as solutions, if not game-changing solutions. Indeed, many times they are, but no solution comes without the seeds of its own costs and challenges. For pragmatic and regulatory compliance reasons, it is increasingly important for boards, senior executives and general counsel to sufficiently understand technologies, not just their potential promise.
By Jeffrey Atteberry
The social, economic, and political forces pushing for a comprehensive overhaul of the nation’s privacy regime are numerous, and many see 2019 as presenting the best opportunity yet for passage of federal data privacy legislation.