Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
In the era of almost daily news accounts of massive retailer credit card data, employer human resources data, and health care provider patient medical data security breaches, the legal and business imperative for data and data system protection needs no explanation. Suffice it to say that privacy and data security are increasingly regulated and the topic of litigation. Data is also a rich source for evidence in litigation and, for many companies, a valuable asset. What is less apparent, however, to many lawyers, business people, and even information professionals, is exactly how to properly manage information and its privacy and security. However, over the past several decades, frameworks, standards, and best practices have been developed for establishing and managing a comprehensive privacy, data protection and information governance program. This article summarizes those learnings to suggest an approach for how to design and run a program that is right for your company.
*May exclude premium content
By Alan Friel and Stephanie Lucas
The importance of promoting brands and products on digital platforms has continued to grow as advertisers are learning how to use social media to reach out to specific populations by harnessing the power and goodwill of the people on these platforms that are popular with and influence particular niche groups of interest. These so-called “influencers” can have thousands, or even millions and tens of millions of followers. But when is the influencer an objective critic, and when is she a paid spokesperson?
Artificially Intelligent Blockchain of Things: Examining Legal Tech’s Biggest Buzzwords
By Ian Lopez
Panelists at ALM Cybersecure 2017 Delved Into the Year’s Biggest Legal Technology Buzzwords and the Hype Fueling Their Popularity
Legal technology has no shortage of buzzwords. The latest slew to take the industry by storm were the topic conversation in a Dec. 5 panel at ALM’s CyberSecure event in New York.
Internet Goods and Product Liability
By Jonathan Bick
The Internet’s value arises in part from its ability to provide images, data and content quickly and at little cost. This ability results from the fact that Internet products — whether they be images, data or content — are each reduced to a digital format. Sharing products that have been so reduced may result in product liability.
Ransomware: What to Do When It Happens to You
By Kiran Raj and Mallory Jensen
In the event that your company is the victim of a ransomware attack, this article provides steps to be taken as part of its response to such an incident. It is meant to be a helpful guide, but the best response generally will depend on different factors, including the scope and severity of the attack, availability of remediation measures, and business sensitivities.