Features

How to Avoid 'Privacy Debt'
For many tech companies today, their products and business model require the collection and storage of data. At the same time, a failure to build adequate data protection technology, processes, and operations will continuously generate "privacy debt" for the business. The accumulation of this "privacy debt" can eventually turn away customers, attract regulatory penalties, and create an existential risk for the company.
Features

Legal Tech: Time to Move from Email to Centralized Platform for E-Discovery
Lawyers need to move away from email as a project management tool to a centralized project management platform — akin to a huge, shared, digital whiteboard — where all production requests are entered on a form that meets litigation support needs.
Features

The Adoption of Legal Analytics
The legal profession continues to embrace legal analytics and its advantages in increasing numbers every year. Now, the more interesting questions pertain to how legal professionals use legal analytics and what the likely path is for legal analytics in the future.
Features

Maintaining Attorney-Client Privilege and Work Product Protections over Forensic Reports in Light of 'Wengui v. Clark Hill'
The Clark Hill opinion is notable because not only does it follow a string of recent opinions that have found data breach forensic reports not to be entitled to work product protection, it also goes one step further to find that a data breach forensic report is not protected by attorney-client privilege.
Features

Why Untangling the CISO from IT Can Improve Governance and Security Outcomes
Despite the fact that the CISO's duties are growing in scope and importance, and data protection has become a board-level concern, many security leaders still do not have a direct line to the CEO.
Features

The Legal Industry Pivoted Quickly in the Wake of COVID-19, and Recent Surveys Suggest There's No Turning Back
This article discusses the key lessons that can be taken from a series of recent surveys that seek to understand the long-term impacts of COVID-19 on the industry from the perspective of legal executives and frontline lawyers in U.S. firms and corporate law departments.
Features

Accountability and ROI: Building Cybersecurity into Your Budget
If we intend to minimize the risk of a successful attack, we must accept cybersecurity as an ongoing, evolving, relentless effort that requires diligence and discipline. And we have to throw more money at it, too.
Features

Privacy and Ethical Concerns of Vaccine Passports
While the concept of digital vaccine passports might seem like a perfect solution, implementation is muddled not only by administrative feasibility, but the web of legal and business considerations raised if requiring the passport to return to the workplace or enter a business. This article untangles some of these complex legal considerations, including privacy and ethical concerns, offering employers guidance in evaluating their feasibility at the workplace.
Features

California Privacy Protection Agency Roster Set
California named five members to the inaugural board of the California Privacy Protection Agency, a new entity created by voters in 2020 that will enforce the state's sweeping consumer privacy laws.
Features

Legal Tech: The Ethics of E-Discovery In a Remote Work Environment
Just as the pandemic has challenged every aspect of our lives, the shift to a remote work environment has significantly impacted e-discovery and the ethical obligations of attorneys in this ever-evolving technological and legal landscape.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Online Interviewing for Use in Lanham Act LitigationInternet interviewing will undoubtedly become the norm over the next decade. Being familiar with the ways to enhance its reliability and validity will be necessary to create scientifically valid, controlled, and reliable studies that can be used in Lanham Act litigation.Read More ›
- China Finalizes New Regulations to Relax Personal Data Exports from ChinaNearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.Read More ›
- Rights and Obligations In Patent LicensesThe owner of a commercially successful patent may have competing desires. On one hand, the patent owner wants to protect the patent and secure its maximum benefit; on the other hand, the patent owner wants to avoid enforcement litigation with competitors because it is expensive and puts the patent at risk.Read More ›