Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Opportunities, Risks and Strategies In the Metaverse Image

Opportunities, Risks and Strategies In the Metaverse

Brandon Leahy and Chloe Delehanty 

While it is still unknown how the metaverse will take shape lawyers advising brands should familiarize themselves with the opportunities it presents, the risks involved, and strategies to consider for enhancing and protecting a client's brand.

Features

The Legal Difficulties of Blockchain Domain Names Image

The Legal Difficulties of Blockchain Domain Names

Jonathan Bick

Blockchain domain names, a new set of domain names, are ripe for cryptocurrency legal abuse and generally not susceptible to traditional legal amelioration. A combination of legal, business and technological approaches is best used to address blockchain domain name legal difficulties.

Features

Keep Terms of Service and Privacy Notices Separate Image

Keep Terms of Service and Privacy Notices Separate

Shawn Helms, David Saunders & David Sorenson

This article examines why terms of service and privacy notices should work in conjunction with one another, but also why it is not advisable to incorporate privacy notices into online terms of service.

Features

SEC Proposed Rules Include Disclosure of Cybersecurity Risk Assessment Strategy Image

SEC Proposed Rules Include Disclosure of Cybersecurity Risk Assessment Strategy

Greg Andrews

Cybersecurity compliance, already an anxiety-inducing topic for many in-house counsel, is about to get even trickier. The SEC rolled out a host of proposed new cybersecurity rules for public companies.

Features

Legal Tech: Are Websites A Forgotten Source of Evidence? Image

Legal Tech: Are Websites A Forgotten Source of Evidence?

Glenn Barden

It's fascinating how quickly the industry has shifted from the days when e-discovery teams would spend weeks digitalizing and coding vellum, microfiche and paper documents to where we are today with dynamic and varied processes to deal with a plethora of electronic sources. Among these are websites, which can provide deep insights in discovery, but have been largely forgotten as a source of evidence.

Features

Examining the Differences Between Data Privacy and Data Security Image

Examining the Differences Between Data Privacy and Data Security

Melissa Griffins Paulk

As businesses develop data protection frameworks to ensure compliance, it is important for companies to design a data protection program that contemplates data privacy and data security individually, to achieve the most comprehensive data protection program.

Features

Taming the Data Privacy Chaos in Contract Management Image

Taming the Data Privacy Chaos in Contract Management

Gretchen Bakhshai

How contract management practitioners can remain in compliance with rapid changes in data privacy regulations.

Features

Cyber-Insecurity: Will the Looming Regulatory Crackdown on Cybersecurity Practices Help Protect Financial Institutions from Attack? Image

Cyber-Insecurity: Will the Looming Regulatory Crackdown on Cybersecurity Practices Help Protect Financial Institutions from Attack?

Lori Van Auken & Adam Jamieson

A slew of new regulations targeting the cybersecurity practices of financial institutions will come into effect during 2022. But will they have any real bearing on protecting financial firms from attack?

Features

Driving Innovation in a Dynamically Changing Legal Market Image

Driving Innovation in a Dynamically Changing Legal Market

Ari Kaplan

A series of interviews with large law firm partners around the world to better understand how they are leveraging technology to drive innovation and transformation in their practices.

Features

The Rise of False Claims Act Cybersecurity Litigation Image

The Rise of False Claims Act Cybersecurity Litigation

Annie Railton, James Gatta, Jud Welle & Emily Notini

While the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The FTC Gets Into the College Athlete NIL Game
    As national champions are crowned in men's and women's basketball, hundreds of thousands of college athletes are entering the influencer marketplace for the first time and now find themselves attractive candidates in the fast growing influencer marketing arena. With influencer marketing potentially providing a 5x return on investment, many brands are eager to get into the industry, but it doesn't come without risks as the FTC Commissioner is taking a closer look at the use of influencers for marketing.
    Read More ›