Features

Inside Cryptocurrency Pump-and-Dump Schemes
Since the inception of cryptocurrency as a widely traded asset, there has been increasing opportunity to make money through market manipulation, specifically through classic pump-and-dump and related fraudulent schemes, and more specifically CPDs.
Features

Legal Tech: Effective Preservation Measures In Litigation Readiness
Basic ESI preservation steps, including litigation holds, relevant source checklists, and follow up steps with custodians may not be enough in some instances. Given the frequency of data loss from custodial and non-custodial sources, companies should also consider incorporating remediation strategies into their approach to preservation to better ensure defensibility.
Features

More than Just a Purchase, a Partnership: Tips for Success with Cloud-based Practice Management In 2022
While functionality and features are important, there are a number of additional considerations when evaluating a practice management solution. Will your platform provider serve as a partner that will offer expert guidance and be invested in your ongoing success?
Features

Predicting What 2022 Holds for Cybersecurity
Predictions aside, complacency is not an option if you plan to survive and thrive in 2022. Rest assured, the future of cybersecurity is bright, but it will come with its own set of challenges. We look forward into the future because the sooner we can start adapting strategy, policies, and technologies, the better off everyone will be in the long run.
Features

Biometric Privacy: A Year In Review (2021) and The Year Ahead (2022)
The year started with Portland, Oregon's ban on the use of facial recognition technology by private entities in places of "public" accommodation. It concluded with the rendering of important appellate decisions on the Illinois Biometric Information Privacy Act. In the middle, was the continued flurry of litigation, class action settlements, and legislative activity.
Features

Cybersecurity and Legal Tech In 2022: Predictions from the Field
It's still a dangerous cyber world as we enter 2022, but one that today's attorneys and legal technologists are prepared to tackle. Here's what they predict for cybersecurity, remote work, privacy and e-discovery in the new year.
Features

Cybersecurity and Corporate Privacy Enforcement Is Focus of Feds
It started as a hushed rumor in the beltway, then became a known fact by those going to join the administration. And now we all know: The Biden administration has brought with it a renewed focus on data privacy and cybersecurity.
Features

'Never Trust, Always Verify': Zero Trust Security
Recognizing the ever-increasing cyber threats to businesses, government entities, and individuals, the White House announced that Federal Civilian Executive Branch agencies must migrate toward Zero Trust Cybersecurity Architecture by September 2024. Under Zero Trust, trust is the ultimate vulnerability of any system and, therefore, trust has to be eliminated from a business' cybersecurity approach.
Features

Protecting a Website's Legal Identity
Protecting an internet site's legal identity begins with the settled proposition that domain names are a form of personal property. The classification of a domain name as property allows the owner to register the domain name with the United States Trademark Office. Additionally, a domain name owner may state a claim for conversion against an entity that unlawfully interferes with the domain name property.
Features

Analyzing the Impact of the Many New Rules of Cybersecurity
New cybersecurity and data protection federal regulations, directives and guidelines as well as new case law, industry-specific guidelines and new state laws that, when taken together, form an industry standard applicable to almost all business sectors
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Clause & EffectNet-Profit Rights/Movies Based on TV Shows<br>Insurance/Contract-Breach Exclusion<br>Insurance/Copyright-Infringement CoverageRead More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Why So Many Great Lawyers Stink at Business Development and What Law Firms Are Doing About ItWhy is it that those who are best skilled at advocating for others are ill-equipped at advocating for their own skills and what to do about it?Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- <b><i>BREAKING NEWS:</i> </b><b>Hewlett-Packard Claims Autonomy Cooked Books</b>Hewlett-Packard Co. said on Nov. 20 that it will take an $8.8 billion write down related to its purchase of Autonomy PLC and alleged that Autonomy executives committed accounting fraud to inflate the company's value during the sale.Read More ›