Features

Corporate Compliance Programs and the DOJ's Emphasis on Data Analytics: What Companies Need to Consider
In recent months, the U.S. Department of Justice has raised expectations for companies to use data analytics to monitor the effectiveness of their compliance programs and to identify potential misconduct.
Features

Right-Resourcing Legal Services
What is the right strategic approach for a legal department to optimize its return on investment for the resources it deploys to render legal services?
Features

Fall 2020 Data Privacy Updates
America and the EU continue altering data privacy frameworks for businesses.
Features

Privacy Issues of Contact Tracing
Companies considering whether to suggest, or even to require, contact tracing for employees or others must consider a host of legal issues, including privacy. This article describes contact tracing, focusing on how technology has made it a more powerful weapon against viruses and diseases than ever before.
Features

Video Conferencing and the CCPA
Users have become increasingly concerned about the privacy of videoconferencing platforms, due to exposure of information from security breaches. We examined the privacy policies of six prominent applications to determine their compliance with the California Consumer Privacy Act (CCPA).
Features

Cybersecurity Practices Grow As Firms Compete for Talent
Law firms in every segment of the market are hiring cybersecurity and privacy laterals and launching new practices, as more of their clients become aware of their vulnerabilities while working remotely.
Features

Legal Tech: Fall 2020's Most Interesting E-Discovery Cases
In this quarter's Case Law Review, we'll take a look at recent rulings that cover the discoverability of ESI on sources other than a computer, whether social media posts offer any degree of privacy, and the importance of proportionality when attempting to compel production during litigation.
Features

Preventing and Mitigating Cultural Engineering Attacks During M&A: What Every Law Firm Needs to Know
Criminals have long taken advantage of unrest and instability, knowing that people's attention will be diverted and their defenses down during uncertain times. This leaves ample space for the less altruistic among us to move in and manipulate a situation to their benefit.
Features

Ransomware: To Pay or Not to Pay Is Not the Question
Ransomware has come a long way since the 1989 "AIDS Trojan." In 2019 ransomware demands topped $12M. Succinctly put: "Ransom demands grew larger. Tactics became more cutthroat."
Features

Data Is Fluid -- So Why Are Data Maps Static?
Data "in transit," or in motion, is data that is moving from one location to other, such as from device to device or through a private network. Data "at rest" is data that is not actively moving from place to place, such as archived data. Protecting data in motion and at rest is crucial for data-driven enterprises as hackers continue to come up with new ways to attack.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Court Caps Landlord's Bankruptcy Claim Against Lease GuarantorGiven that landlord damage claims could overwhelm other creditor claims in a tenant's bankruptcy case, the Bankruptcy Code includes a provision that limits a landlord's claim, which presents challenges for landlords as creditors in bankruptcy cases.Read More ›
- A 'Cloud Security Doctrine' for Law FirmsCloud computing may be here to stay, but is it truly safer than the solutions that it's outmoding? The Legal Cloud Computing Association (LCCA) thinks there's a path to greater security, publishing for law firms its first "Cloud Security Doctrine."Read More ›
- IP NewsFederal Circuit: PTAB Did Not Err In Finding That It Retained Authority to Issue Final Written Decision After Deadline Passed Federal Circuit: District Court Did Not Err In Finding That an Abbreviated New Drug Application Is Limited to the Uses Described ThereinRead More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›