Features

SCOTUS Narrowly Interprets CFAA to Avoid Criminalizing 'Commonplace Computer Activity'
The Court held that only those who obtain information from particular areas of the computer which they are not authorized to access can be said to "exceed authorization," and the statute does not — as the government had argued — cover behavior where a person accesses information which he is authorized to access but does so for improper purposes.
Features

EDRM Asks for Public Comment on New Information Governance Model
Adoption of the IGRM model could mean "improving dialogue about information governance, increasing the buy in from stakeholders, and expanding the awareness of the importance of information governance in the modern enterprise."
Features

Upping Your New Business Game with AI
With demand for technology innovation and efficiency at an all-time high, we can look to Artificial Intelligence (AI), Machine Learning (ML), and Natural Language Processing (NLP) to help streamline and automate proposal and RFP management, and bridge the gap between increases in RFP requests and lower win rates.
Features

NY Privacy Act Stalls, Would Escalate Protections Above Other State & International Regulations
The failure of NYPA to pass is not exceptionally noteworthy. What is noteworthy, however, is that it marks an escalation of data privacy protections and restrictions not seen in other major regulatory regimes, whether in the United States or abroad. And since most believe its failure to pass was due more to the end-of-session rush than its contents, don't be surprised if it pops up again in January 2022.
Features

Managing and Preserving Zoom Data
With business conversations extending across video, audio, transcripts and chat, it will not be long before we see Zoom data appearing as evidence in court. Legal teams and CIOs need to think about how to preserve Zoom data proactively for litigation case assessments, discovery, and holds, as well as investigations and regulatory actions.
Features

National Security Implications of the Colonial Pipeline Hack
It is difficult to think of a comparable cyber event to the one that effectively shut down the fuel pipeline that feeds over a third of the United States. We are in the midst of a national cyber crisis, and while we may have a blueprint for the resolution of these other crises, things must urgently change on the cybersecurity front.
Features

Where Is the Consumer In Consumer Privacy Legislation?
In the past four months of 2021, the amount of state legislative activity around consumer data privacy laws has been frantic, by state legislatures standards. So much so, it is not easy to discern the cause for all this effort.
Features

Attorney Competence in Technology Is in the Spotlight. Are You Competent?
In response to widespread changes in the use of technology, and evaluating the potential risks of remote work and the rise of virtual meeting platforms, on March 10, 2021, the ABA Standing Committee on Ethics and Professional Responsibility issued Formal Opinion 498 making it clear that the Model Rules of Professional Conduct permit lawyers to conduct their practices virtually, but urges caution at all times:
Features

Closing the Information Security Gaps In the New Operational Model
In 2020, law firms did what they had to do to continue serving their clients. Information governance may have been sacrificed in the face of an urgent, global crisis. As understandable as that is, it's time now to step back and assess best practices for the new operational model that is here to stay.
Features

Mastery of Information: How to Successfully Manage Ungoverned Data for Risk Mitigation
Companies are collecting and managing more data than ever, essentially in order to create value, thus in effect making every company a "data" company. But for data to provide value, organizations need to know where it is, who has access to it, how it's managed, including its longevity value, and how it needs to be secured and protected.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Clause & EffectNet-Profit Rights/Movies Based on TV Shows<br>Insurance/Contract-Breach Exclusion<br>Insurance/Copyright-Infringement CoverageRead More ›
- Rights and Obligations In Patent LicensesThe owner of a commercially successful patent may have competing desires. On one hand, the patent owner wants to protect the patent and secure its maximum benefit; on the other hand, the patent owner wants to avoid enforcement litigation with competitors because it is expensive and puts the patent at risk.Read More ›
- Foreseeability as a Bar to Proof of Patent InfringementThe doctrine of equivalents is a rule of equity adopted more than 150 years ago by the U.S. Supreme Court. Prosecution history estoppel is a rule of equity that controls access to the doctrine. In May 2002, the Court was called upon to revisit the doctrine and the estoppel rule in <i>Festo Corp. v. Shoketsu Kinzoku Kogyo Kabushiki Co. Ltd.</i> Ultimately the Court reaffirmed the doctrine and expanded the estoppel rule, but not without inciting heated debate over the Court's rationale — especially since it included a new and controversial foreseeability test in its analysis for estoppel.Read More ›