Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Washington My Health My Data Act FAQs: Data Subject Rights Image

Washington My Health My Data Act FAQs: Data Subject Rights

Amy de La Lama & Andrea Rastelli

Like so many other features of the MHMDA, data subject rights are deceptively complicated and have the potential to create significant administrative hurdles to getting it right. In this article, we examine the tricky issues in our MHMDA FAQs and take a deep dive into data subject rights.

Features

Programmers Liability for Alleged Rights Violations Caused By AI Software Image

Programmers Liability for Alleged Rights Violations Caused By AI Software

Jonathan Bick

AI is designed to accomplish goals specified by and receive directions from a human being. Thus, it has been suggested that either direct or vicarious liability may be applied to hold the human programmer who wrote the software algorithms liable for the damages caused by the AI agent.

Features

Determining Ownership Rights of Social Media Accounts Image

Determining Ownership Rights of Social Media Accounts

Dyan Finguerra-DuCharme, Felicity Kohn & Abla Belhachmi

This article provides guidance on the standards courts apply in determining ownership rights over social media accounts, as well as best practices to head off such disputes before they occur.

Features

What Employers Need to Know About Employee Privacy Image

What Employers Need to Know About Employee Privacy

Lisa Gingeleskie

Many employers struggle with not only identifying what is private protectable information, but also how to safeguard that information while also protecting the company's own business interests. Given the increased costs of litigation, it is critical that employers understand their obligations under the law and how to strike a legally compliant balance between these competing interests.

Features

Law Firms' Pressing AI Questions Image

Law Firms' Pressing AI Questions

Cassandre Coyer

Most of the legal industry has by now boarded the generative artificial intelligence train, filling up conference sessions dedicated to the topic, testing new legal technology solutions and exploring the emerging legal questions that the technology will pose. But most of their questions about generative AI are still unanswered.

Features

U.S. Regulators Lift the Curtain on Data Practices with Assessment, Reporting and Audit Requirements Image

U.S. Regulators Lift the Curtain on Data Practices with Assessment, Reporting and Audit Requirements

Alan Friel, David Manek, Sasha Kiosse, David Farber & Colleen M. Yushchak

The assessment and audit requirements of the new generation of state data protection laws will force U.S. companies to move beyond mere window dressing and instead require them to develop fulsome data protection programs.

Features

Artificial Intelligence Redefines Our Defense Against Cyber Threats Image

Artificial Intelligence Redefines Our Defense Against Cyber Threats

Roy Hadley

The cybersecurity landscape is on the brink of a transformative shift, with predictive analytics and behavioral analysis leading the charge for more resilient and adaptive defenses.

Features

Deep Fake of CFO on Videocall Used to Defraud Company of $25M Image

Deep Fake of CFO on Videocall Used to Defraud Company of $25M

Scott Warren

Hackers are using AI to sift large digital data to identify more convincing approaches for their scams as well as weaknesses in weaknesses in software coding or network security.

Features

5 Expert Cybersecurity Steps to Take in 2024 Image

5 Expert Cybersecurity Steps to Take in 2024

Luke Tenery

As many CISOs and cyber teams think about the year ahead, and legal professionals consider the far-reaching consequences of cybersecurity, here is a checklist to help them prepare for the biggest cybersecurity trends to come.

Features

Pennsylvania Court Hit With Cyberattack, But It Had a Plan Image

Pennsylvania Court Hit With Cyberattack, But It Had a Plan

Daniel J. Siegel

Law firms have information that hackers want — Social Security numbers, financial data, personally identifiable information and more. It is therefore essential that firms plan for a possible breach. And when the breach occurs, have a plan.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The FTC Gets Into the College Athlete NIL Game
    As national champions are crowned in men's and women's basketball, hundreds of thousands of college athletes are entering the influencer marketplace for the first time and now find themselves attractive candidates in the fast growing influencer marketing arena. With influencer marketing potentially providing a 5x return on investment, many brands are eager to get into the industry, but it doesn't come without risks as the FTC Commissioner is taking a closer look at the use of influencers for marketing.
    Read More ›
  • The Roadmap of Litigation Analytics
    Litigation analytics can be considered a roadmap of sorts — an important guide to ensure the legal professional arrives at the correct litigation strategy or business plan. However, like roadmaps, litigation analytics will only be useful if it's based on data that is complete and accurate.
    Read More ›