Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

New Technologies Make for a Shifting Definition of 'Technical Competence' Image

New Technologies Make for a Shifting Definition of 'Technical Competence'

Tinamarie Feil

While new and/or improving technologies may be challenging, they likely also present new opportunities which can facilitate delivering the best services at the best cost. Some solutions can be handled directly by law firms — but others will require the courts to approve, and, perhaps, even change of procedures to get with the times.

Features

Franchisors and Franchisees Make for Easy Cyber Targets Image

Franchisors and Franchisees Make for Easy Cyber Targets

Marc Lieberstein & Raymond Aghaian

We are increasingly hearing about security breaches, data leaks and other kind of data theft in the franchise world. This is because frequently the franchise systems operate as a connected mass of franchisees all of whom collect, store and transmit a diverse array of consumer and personal data to the franchisor. In other words, franchisors and franchisee make a nice easy target for cyber theft.

Features

Jurisdictional License Requirements and Disparate Laws Are Hindering Law Firms' Fight Against Cybercrime Image

Jurisdictional License Requirements and Disparate Laws Are Hindering Law Firms' Fight Against Cybercrime

Isha Marathe

Some cybersecurity experts think the structure of law in the U.S. itself means that truly fighting against growing threat actors is a losing game. Take, for example, the fact that attorneys are largely limited by jurisdictional licensure requirements. While on the other hand, bad actors are often organized, unsaddled by jurisdictional challenges, and able to function as a large decentralized group.

Features

Will Other States Follow NY's Lead on Requiring Cybersecurity CLE? Image

Will Other States Follow NY's Lead on Requiring Cybersecurity CLE?

Cassandre Coyer

New York has become the first state to add a requirement mandating that lawyers take legal education courses in cybersecurity, privacy and data protection. As cyberthreats will likely continue to both grow and evolve in sophistication, attorneys expect this requirement to be only a first step, with more states likely to soon follow.

Features

Text Messages In E-Discovery Image

Text Messages In E-Discovery

David Horrigan

This article looks beyond conspiracy theories and Secret Service slip-ups — or subterfuge, depending on one's perspective — to take a look at the law and technology of texts in e-discovery.

Features

Data Rights, Data Duties, & Data Risks: The American Data Privacy and Protection Act Image

Data Rights, Data Duties, & Data Risks: The American Data Privacy and Protection Act

Rita W. Garry

While the ADPPA represents compromises between Democratic and Republican leadership of the U.S. Senate and House of Representatives, particularly around the thorny issues of state law preemption and private rights of action, there are other legislative and big tech industry players pushing their own agendas for comprehensive national data privacy and security frameworks.

Features

Not Just Your Same Old Privacy Legislation: A Compliance Briefing for Privacy Officers on the New Canadian Consumer Privacy Protection Act Image

Not Just Your Same Old Privacy Legislation: A Compliance Briefing for Privacy Officers on the New Canadian Consumer Privacy Protection Act

John Beardwood & Shan Arora

Part One In a Series This article, which reviews the Canadian Consumer Privacy Protection Act, first seeks to identify the delta between the Act and PIPEDA in order to allow privacy officers of organizations that are already PIPEDA compliant to identify the net new compliance requirements under the Act and second, to highlight the provisions of the Act which, if breached, could lead to the imposition of significant fines.

Features

Data Privacy and Security Considerations for Mobile Health App Developers and Their Counsel Image

Data Privacy and Security Considerations for Mobile Health App Developers and Their Counsel

Angela Matney

In light of the evolving legal and regulatory landscape, app developers and their counsel should examine developers' privacy and security practices and take steps to safeguard sensitive data related to reproductive health.

Features

California's Latest Privacy Rulemaking Proposes Further Obligations for Businesses   Image

California's Latest Privacy Rulemaking Proposes Further Obligations for Businesses  

Kyle Fath, Alan Friel, Shea Leitch & David J. Oberly

While the the California Privacy Protection Agency kicked some of the more difficult issues down the road for further consideration, its first draft of proposed Regs is quite comprehensive with respect to the issues addressed. The authority for some of what is proposed is questionable and will likely be challenged in comments, if not judicial action, if such provisions become final.

Features

Proactively Tackling Unstructured Data Can Give Competitive Advantage Image

Proactively Tackling Unstructured Data Can Give Competitive Advantage

Rich Hale

Unstructured data comprises 80% of total data volume for legal organizations, which means that on average, only one-fifth of the entirety of the data set is properly secured and actively managed. Although some believe that ignoring unstructured data establishes plausible deniability that relinquishes them from culpability when a breach occurs, it's an untenable position from both a regulatory and brand reputational perspective.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Technology in Marketing: Where to Invest Your Marketing Technology Dollars
    Law firms have realized that using technology ' particularly the Internet ' is a powerful tool for creating a more level playing field to enhance their images, expand their visibility in targeted markets and drive business to their firms. However, with so many competing interests for limited marketing dollars, where should you invest your firm's resources to get the most bang for the buck?
    Read More ›
  • Coverage Issues Stemming from Dry Cleaner Contamination Suits
    In recent years, there has been a growing number of dry cleaners claiming to be "organic," "green," or "eco-friendly." While that may be true with respect to some, many dry cleaners continue to use a cleaning method involving the use of a solvent called perchloroethylene, commonly known as perc. And, there seems to be an increasing number of lawsuits stemming from environmental problems associated with historic dry cleaning operations utilizing this chemical.
    Read More ›