Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Predicting What 2022 Holds for Cybersecurity Image

Predicting What 2022 Holds for Cybersecurity

Emil Sayegh

Predictions aside, complacency is not an option if you plan to survive and thrive in 2022. Rest assured, the future of cybersecurity is bright, but it will come with its own set of challenges. We look forward into the future because the sooner we can start adapting strategy, policies, and technologies, the better off everyone will be in the long run.

Features

Biometric Privacy: A Year In Review (2021) and The Year Ahead (2022) Image

Biometric Privacy: A Year In Review (2021) and The Year Ahead (2022)

Lauren Caisman and Christian Auty

The year started with Portland, Oregon's ban on the use of facial recognition technology by private entities in places of "public" accommodation. It concluded with the rendering of important appellate decisions on the Illinois Biometric Information Privacy Act. In the middle, was the continued flurry of litigation, class action settlements, and legislative activity.

Features

Cybersecurity and Legal Tech In 2022: Predictions from the Field Image

Cybersecurity and Legal Tech In 2022: Predictions from the Field

Zach Warren

It's still a dangerous cyber world as we enter 2022, but one that today's attorneys and legal technologists are prepared to tackle. Here's what they predict for cybersecurity, remote work, privacy and e-discovery in the new year.

Features

Cybersecurity and Corporate Privacy Enforcement Is Focus of Feds Image

Cybersecurity and Corporate Privacy Enforcement Is Focus of Feds

David Saunders & Julian L. André

It started as a hushed rumor in the beltway, then became a known fact by those going to join the administration. And now we all know: The Biden administration has brought with it a renewed focus on data privacy and cybersecurity.

Features

'Never Trust, Always Verify': Zero Trust Security Image

'Never Trust, Always Verify': Zero Trust Security

Rebecca L. Warren

Recognizing the ever-increasing cyber threats to businesses, government entities, and individuals, the White House announced that Federal Civilian Executive Branch agencies must migrate toward Zero Trust Cybersecurity Architecture by September 2024. Under Zero Trust, trust is the ultimate vulnerability of any system and, therefore, trust has to be eliminated from a business' cybersecurity approach.

Features

Protecting a Website's Legal Identity Image

Protecting a Website's Legal Identity

Jonathan Bick

Protecting an internet site's legal identity begins with the settled proposition that domain names are a form of personal property. The classification of a domain name as property allows the owner to register the domain name with the United States Trademark Office. Additionally, a domain name owner may state a claim for conversion against an entity that unlawfully interferes with the domain name property.

Features

Analyzing the Impact of the Many New Rules of Cybersecurity Image

Analyzing the Impact of the Many New Rules of Cybersecurity

Kenya Parrish-Dixon

New cybersecurity and data protection federal regulations, directives and guidelines as well as new case law, industry-specific guidelines and new state laws that, when taken together, form an industry standard applicable to almost all business sectors

Features

Where Does Content Use Stand Now After Recent Rulings on 'Embedding' Foreshadow Circuit Split? Image

Where Does Content Use Stand Now After Recent Rulings on 'Embedding' Foreshadow Circuit Split?

Tamerlin Godley & Kiaura Clark

When and how can you display someone else's visual content on your website without running afoul of copyright law? When and how can someone else display your visual content? A recent ruling out of the Southern District of New York may upend the current paradigm.

Features

In a Year of the Great Resignation, Corporations Need to Prepare for the Great Investigation Image

In a Year of the Great Resignation, Corporations Need to Prepare for the Great Investigation

Veeral Gosalia

Even before this Great Resignation movement, corporations across the globe were reporting increases in suspicious activity, data leakage, IP theft and other data risks stemming from departing employees and remote workers. And now, with more employees having exited and the Great Resignation seeming to accelerate further, existing data and risk implications are likely to be compounded.

Features

How Law Firms Can Gain a Competitive Advantage with Financial Intelligence Image

How Law Firms Can Gain a Competitive Advantage with Financial Intelligence

Ari Kaplan

Results of the new "Implementing Financial Intelligence to Give Law Firms a Competitive Advantage in 2022 and Beyond" report revealed a striking shift in the role of law firm finance leaders, both in their value and impact. Many are using data to drive change in their organizations, amplifying the power of profitability, and leveraging their skill to fuel innovation.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The FTC Gets Into the College Athlete NIL Game
    As national champions are crowned in men's and women's basketball, hundreds of thousands of college athletes are entering the influencer marketplace for the first time and now find themselves attractive candidates in the fast growing influencer marketing arena. With influencer marketing potentially providing a 5x return on investment, many brands are eager to get into the industry, but it doesn't come without risks as the FTC Commissioner is taking a closer look at the use of influencers for marketing.
    Read More ›