Features

Corporate Compliance Programs and the DOJ's Emphasis on Data Analytics: What Companies Need to Consider
In recent months, the U.S. Department of Justice has raised expectations for companies to use data analytics to monitor the effectiveness of their compliance programs and to identify potential misconduct.
Features

Right-Resourcing Legal Services
What is the right strategic approach for a legal department to optimize its return on investment for the resources it deploys to render legal services?
Features

Fall 2020 Data Privacy Updates
America and the EU continue altering data privacy frameworks for businesses.
Features

Privacy Issues of Contact Tracing
Companies considering whether to suggest, or even to require, contact tracing for employees or others must consider a host of legal issues, including privacy. This article describes contact tracing, focusing on how technology has made it a more powerful weapon against viruses and diseases than ever before.
Features

Video Conferencing and the CCPA
Users have become increasingly concerned about the privacy of videoconferencing platforms, due to exposure of information from security breaches. We examined the privacy policies of six prominent applications to determine their compliance with the California Consumer Privacy Act (CCPA).
Features

Cybersecurity Practices Grow As Firms Compete for Talent
Law firms in every segment of the market are hiring cybersecurity and privacy laterals and launching new practices, as more of their clients become aware of their vulnerabilities while working remotely.
Features

Legal Tech: Fall 2020's Most Interesting E-Discovery Cases
In this quarter's Case Law Review, we'll take a look at recent rulings that cover the discoverability of ESI on sources other than a computer, whether social media posts offer any degree of privacy, and the importance of proportionality when attempting to compel production during litigation.
Features

Preventing and Mitigating Cultural Engineering Attacks During M&A: What Every Law Firm Needs to Know
Criminals have long taken advantage of unrest and instability, knowing that people's attention will be diverted and their defenses down during uncertain times. This leaves ample space for the less altruistic among us to move in and manipulate a situation to their benefit.
Features

Ransomware: To Pay or Not to Pay Is Not the Question
Ransomware has come a long way since the 1989 "AIDS Trojan." In 2019 ransomware demands topped $12M. Succinctly put: "Ransom demands grew larger. Tactics became more cutthroat."
Features

Data Is Fluid -- So Why Are Data Maps Static?
Data "in transit," or in motion, is data that is moving from one location to other, such as from device to device or through a private network. Data "at rest" is data that is not actively moving from place to place, such as archived data. Protecting data in motion and at rest is crucial for data-driven enterprises as hackers continue to come up with new ways to attack.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Online Interviewing for Use in Lanham Act LitigationInternet interviewing will undoubtedly become the norm over the next decade. Being familiar with the ways to enhance its reliability and validity will be necessary to create scientifically valid, controlled, and reliable studies that can be used in Lanham Act litigation.Read More ›
- China Finalizes New Regulations to Relax Personal Data Exports from ChinaNearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.Read More ›
- Rights and Obligations In Patent LicensesThe owner of a commercially successful patent may have competing desires. On one hand, the patent owner wants to protect the patent and secure its maximum benefit; on the other hand, the patent owner wants to avoid enforcement litigation with competitors because it is expensive and puts the patent at risk.Read More ›