Features

SCOTUS Narrowly Interprets CFAA to Avoid Criminalizing 'Commonplace Computer Activity'
The Court held that only those who obtain information from particular areas of the computer which they are not authorized to access can be said to "exceed authorization," and the statute does not — as the government had argued — cover behavior where a person accesses information which he is authorized to access but does so for improper purposes.
Features

EDRM Asks for Public Comment on New Information Governance Model
Adoption of the IGRM model could mean "improving dialogue about information governance, increasing the buy in from stakeholders, and expanding the awareness of the importance of information governance in the modern enterprise."
Features

Upping Your New Business Game with AI
With demand for technology innovation and efficiency at an all-time high, we can look to Artificial Intelligence (AI), Machine Learning (ML), and Natural Language Processing (NLP) to help streamline and automate proposal and RFP management, and bridge the gap between increases in RFP requests and lower win rates.
Features

NY Privacy Act Stalls, Would Escalate Protections Above Other State & International Regulations
The failure of NYPA to pass is not exceptionally noteworthy. What is noteworthy, however, is that it marks an escalation of data privacy protections and restrictions not seen in other major regulatory regimes, whether in the United States or abroad. And since most believe its failure to pass was due more to the end-of-session rush than its contents, don't be surprised if it pops up again in January 2022.
Features

Managing and Preserving Zoom Data
With business conversations extending across video, audio, transcripts and chat, it will not be long before we see Zoom data appearing as evidence in court. Legal teams and CIOs need to think about how to preserve Zoom data proactively for litigation case assessments, discovery, and holds, as well as investigations and regulatory actions.
Features

National Security Implications of the Colonial Pipeline Hack
It is difficult to think of a comparable cyber event to the one that effectively shut down the fuel pipeline that feeds over a third of the United States. We are in the midst of a national cyber crisis, and while we may have a blueprint for the resolution of these other crises, things must urgently change on the cybersecurity front.
Features

Where Is the Consumer In Consumer Privacy Legislation?
In the past four months of 2021, the amount of state legislative activity around consumer data privacy laws has been frantic, by state legislatures standards. So much so, it is not easy to discern the cause for all this effort.
Features

Attorney Competence in Technology Is in the Spotlight. Are You Competent?
In response to widespread changes in the use of technology, and evaluating the potential risks of remote work and the rise of virtual meeting platforms, on March 10, 2021, the ABA Standing Committee on Ethics and Professional Responsibility issued Formal Opinion 498 making it clear that the Model Rules of Professional Conduct permit lawyers to conduct their practices virtually, but urges caution at all times:
Features

Closing the Information Security Gaps In the New Operational Model
In 2020, law firms did what they had to do to continue serving their clients. Information governance may have been sacrificed in the face of an urgent, global crisis. As understandable as that is, it's time now to step back and assess best practices for the new operational model that is here to stay.
Features

Mastery of Information: How to Successfully Manage Ungoverned Data for Risk Mitigation
Companies are collecting and managing more data than ever, essentially in order to create value, thus in effect making every company a "data" company. But for data to provide value, organizations need to know where it is, who has access to it, how it's managed, including its longevity value, and how it needs to be secured and protected.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Court Caps Landlord's Bankruptcy Claim Against Lease GuarantorGiven that landlord damage claims could overwhelm other creditor claims in a tenant's bankruptcy case, the Bankruptcy Code includes a provision that limits a landlord's claim, which presents challenges for landlords as creditors in bankruptcy cases.Read More ›
- A 'Cloud Security Doctrine' for Law FirmsCloud computing may be here to stay, but is it truly safer than the solutions that it's outmoding? The Legal Cloud Computing Association (LCCA) thinks there's a path to greater security, publishing for law firms its first "Cloud Security Doctrine."Read More ›
- IP NewsFederal Circuit: PTAB Did Not Err In Finding That It Retained Authority to Issue Final Written Decision After Deadline Passed Federal Circuit: District Court Did Not Err In Finding That an Abbreviated New Drug Application Is Limited to the Uses Described ThereinRead More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›