Features

The Slack Explosion: Convenient Yet Complicated
Part One of a Two-Part Series The informality of chat culture not only makes chat data harder to search, it also results in huge volumes of a new kind of data that must be processed in unique ways before it can be reviewed.
Features

Attorneys Forecast Legal Challenges In NFTs
As nonfungible tokens, or NFTs, continue to grow in popularity through cryptocurrency purchase, sale and trade online, opportunities for entertainment attorneys in the emerging industry also are booming. For this article, attorneys shared how they're grabbing hold of NFT-related work and the challenges they foresee.
Features

Opportunities, Risks and Strategies In the Metaverse
While it is still unknown how the metaverse will take shape lawyers advising brands should familiarize themselves with the opportunities it presents, the risks involved, and strategies to consider for enhancing and protecting a client's brand.
Features

The Legal Difficulties of Blockchain Domain Names
Blockchain domain names, a new set of domain names, are ripe for cryptocurrency legal abuse and generally not susceptible to traditional legal amelioration. A combination of legal, business and technological approaches is best used to address blockchain domain name legal difficulties.
Features

Keep Terms of Service and Privacy Notices Separate
This article examines why terms of service and privacy notices should work in conjunction with one another, but also why it is not advisable to incorporate privacy notices into online terms of service.
Features

SEC Proposed Rules Include Disclosure of Cybersecurity Risk Assessment Strategy
Cybersecurity compliance, already an anxiety-inducing topic for many in-house counsel, is about to get even trickier. The SEC rolled out a host of proposed new cybersecurity rules for public companies.
Features

Legal Tech: Are Websites A Forgotten Source of Evidence?
It's fascinating how quickly the industry has shifted from the days when e-discovery teams would spend weeks digitalizing and coding vellum, microfiche and paper documents to where we are today with dynamic and varied processes to deal with a plethora of electronic sources. Among these are websites, which can provide deep insights in discovery, but have been largely forgotten as a source of evidence.
Features

Examining the Differences Between Data Privacy and Data Security
As businesses develop data protection frameworks to ensure compliance, it is important for companies to design a data protection program that contemplates data privacy and data security individually, to achieve the most comprehensive data protection program.
Features

Taming the Data Privacy Chaos in Contract Management
How contract management practitioners can remain in compliance with rapid changes in data privacy regulations.
Features

Cyber-Insecurity: Will the Looming Regulatory Crackdown on Cybersecurity Practices Help Protect Financial Institutions from Attack?
A slew of new regulations targeting the cybersecurity practices of financial institutions will come into effect during 2022. But will they have any real bearing on protecting financial firms from attack?
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Artist Challenges Copyright Office Refusal to Register Award-Winning AI-Assisted WorkCopyright law has long struggled to keep pace with advances in technology, and the debate around the copyrightability of AI-assisted works is no exception. At issue is the human authorship requirement: the principle that a work must have a human author to be eligible for copyright protection. While the Copyright Office has previously cited this "bedrock requirement of copyright" to reject registrations, recent decisions have focused on the role of human authorship in the context of AI.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Sender Beware: Jurisdictional Risks of Pre-Litigation CommunicationsThe Federal Circuit recently clarified — and lowered — the threshold to exercise specific personal jurisdiction over an out of state declaratory judgment defendant.Read More ›
- Beach Boys Songs Written Decades Ago Triggered Current Quarrel With LawyersThere's current litigation in the ongoing Beach Boys litigation saga. A lawsuit filed in 2019 against Nevada residents Mike Love and his wife Jacquelyne in the U.S. District Court for the District of Nevada that alleges inaccurate payment by the Loves under the retainer agreement and seeks $84.5 million in damages.Read More ›
- Supreme Court Rules Rejection of Trademark License Does Not Rescind Rights of LicenseeMission Product Holdings, Inc. v. Tempnology, LLC The question is whether a debtor's rejection of its agreement granting a license "terminates rights of the licensee that would survive the licensor's breach under applicable nonbankruptcy law."Read More ›