Features

States Take the Lead on Securing IoT
The California IoT Security Law is the first of its kind in the nation and pushes device manufacturers to adopt cybersecurity standards during the product development and design stages where none have existed before.
Features

Why the Cannabis Industry Must Address the Unique Challenges of Mandated Data Retention
Two overarching factors increase the cannabis industry's data security risks: data sensitivity brought on by federal illegality and lingering cultural divisiveness; and massive, mandated data footprints brought on by intense state and local regulatory scrutiny.
Features

Legal Tech: Recovery Models for e-Discovery and Litigation Support Services that Make an Impact
With big data and the resulting explosion of electronic documents, texts, images and voicemails that are subject to discovery, the cost burden was increasing at a pace that required firms to reconsider their recovery approach. This is why in 2019, Mattern conducted its first deep dive into e-discovery and litigation support cost recovery in the 2020 e-Discovery and Litigation Support Cost Recovery Survey. Some of the results were surprising.
Features

Legal Tech: Will the U.S. Become a Haven for International Discovery Under Section 1782?
Second and Eleventh Circuit rulings are likely to expand refuge to discovery in the U.S., even for international litigation and arbitrations that don't ordinarily include discovery rights.
Features

Coronavirus Work-from-Home Response A Boon for Cybercriminal Exploitation
Here are some of the key issues of which law firms and companies need to be aware and steps that should be considered to minimize the risk to keep everyone — and client data — safe.
Features

Litigators and Privacy: The Last People You Want to See, or the First?
In their consideration of possible worst-case cyber attack scenarios, organizations often focus on the various types of attacks and their relative severity. But, the worst-case scenario is not the breach, it's the reputational damage, regulatory enforcement action, the business interruption, and the inevitable litigation that follows a poorly handled breach from an unprepared organization. Given this reality, it is important to adjust planning assumptions and response scenarios to focus on addressing these drivers of post-breach exposure.
Features

Protecting Innovation in the Cyber World from Patent Trolls
With trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.
Features

In the Know: Top 5 Legal Technology Trends for the 2020s
Technology allows attorneys to keep informed so they can help their clients understand the potential impact on their company.
Features

Defining Reasonable Care for the Protection of Personal Data
The Pennsylvania Supreme Court enlivened the Thanksgiving holidays of privacy lawyers in 2018 with its decision in Dittman v. UPMC, which held that an employer has a legal duty to exercise reasonable care to safeguard employees' personal information. While the scope of the decision technically was confined to the employer-employee relationship, the court's reasoning implies that such a duty of reasonable care may arise in any scenario where one party engages in the collection of personal information.
Features

Navigating APT Intrusions
Advanced Persistent Threat (APT) intrusions are sophisticated cyber-attacks carried out by well-funded and organized cyber-criminals. The attacks are designed to establish persistence using various tactics, techniques and procedures that are intended to avoid detection and mimic authorized activity in the environment, known as "living off the land."
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The 'Sophisticated Insured' DefenseA majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.Read More ›
- The Brave New World of Cybersecurity Due Diligence in Mergers and Acquisitions: Pitfalls and OpportunitiesLike poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.Read More ›
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric CodeIn an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.Read More ›
- The New York Uniform Commercial Code Comes of AgeParties in large non-consumer transactions with no connection whatsoever to New York often choose its law to govern their transactions, and New York statutes permit them to do so. What most people do not know is that the New York Uniform Commercial Code is outdated.Read More ›