Features

Legal Tech: Twitter's Future and E-discovery
Whether Twitter's doomsday is coming is still uncertain. But the threat of loss of years' worth of companies' data could be the impetus behind testing collection tools and reevaluating e-discovery processes.
Features

Incident Response Plans and Tabletop Exercises May Be A Waste of Time
Developing and delivering an IRP or TTE to improve the effectiveness of your incident response approach, in isolation, does not work. If your incident response preparation activity does not include some fundamental tactical actions, when the time comes and your house is on fire, your breach response will fail to meet your expectations.
Features

Hot Button Enforcement Issues In the New Canadian Consumer Privacy Protection Act
Part Four In a Series The conclusion of the series on Canada's recently introduced Consumer Privacy Protection Act looks at hot button enforcement issues in the Act.
Features

The Great Resignation and Its Impact on Legal Department Contract Workflows & KM
Like other organizations, including law firms, in-house legal departments have not been spared from the "great resignation." Lawyers and professionals across all industries are actively seeking new opportunities for a host of reasons including better pay, better culture and better balance. When they leave, they take with them not just their talent but the institutional knowledge they've accumulated, while their former team members are left to piece things together.
Features

Arm Yourself Against Crypto Regulatory Uncertainty
The promise that the crypto and digital assets markets bring comes bundled with uncertainty — especially on the regulatory front. Until jurisdictions adopt unified and consistent frameworks that account for the unique facets and features of cryptocurrencies, institutional investors and other market participants must keep abreast of ever-changing, dynamic laws to avoid sanctions and fines.
Features

Courts Strictly Construing Cyber Insurance Policies, Finding Coverage Is Narrow
In several recent cases, companies with cyber insurance discovered that provisions in these policies led their insurers to limit coverage. Courts have been strictly construing cyber policies, and have found that the coverage provided is narrow. These decisions hinged upon whether an event constituted a covered "direct" loss and whether intervening actions precluded coverage, like an employee responding to fraudulent communications.
Features

Evolution of the Standing Requirement In Data Breach Class Actions
As the landscape of cybersecurity and data privacy continues to evolve, so do the requirements needed to establish standing in regard to the type of harm suffered as a result of a data breach. Moreover, there has been a shift in the requirements needed to hold an organization legally and financially responsible for data stolen during a data breach.
Features

Cybercrime and Bankruptcy: The Crypto Winter
It comes as no surprise that the crypto winter has reinforced the perception of critics that digital currencies are "risky, flawed and unproven digital financial instruments." This article analyzes the state of the cryptocurrency market and examines the impact of cybercrimes and crypto bankruptcies on the current market.
Features

The Information Governance Groundhog Day Syndrome
Security and privacy start with good information governance, and for many firms — trying to get their information governance policy implemented feels a lot like Groundhog Day. Yes, the one with Bill Murray. Let's take a closer look.
Features

Compliance for Privacy Officers on the New Canadian Consumer Privacy Protection Act
Part Three In a Series Part Three continues the analysis of new compliance requirements in Canada's new Consumer Privacy Protection Act, including the content of organizational privacy policies and anonymization of personal information policies, and business transaction policies contained in the Act.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Beach Boys Songs Written Decades Ago Triggered Current Quarrel With LawyersThere's current litigation in the ongoing Beach Boys litigation saga. A lawsuit filed in 2019 against Nevada residents Mike Love and his wife Jacquelyne in the U.S. District Court for the District of Nevada that alleges inaccurate payment by the Loves under the retainer agreement and seeks $84.5 million in damages.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- The Settlement Privilege and the Threat of Legal ActionPart One of this article considers the issue of when a threat to litigate encased by a settlement demand raises the specter of extortion, and the extent to which a potentially extortionate settlement communication should be outside the scope of the privilege.Read More ›