Features
Safeguarding Your Intellectual Property
The documents that a firm produces are its greatest asset, yet firms historically have not made sufficient efforts to safeguard those documents from both internal and external threats. Law firms have typically had an open-door approach to document access. This means that anyone in your firm can likely access any document at any time, leaving your firm's intellectual property entirely unprotected.
Features
What Is the Appropriate Statute of Limitations Period for BIPA Claims?
The BIPA compliance lag has led companies using or collecting biometric information to consider how far back their liability may extend. The Illinois General Assembly, however, did not include an explicit statute of limitations period in BIPA. As a result, the statute of limitations has become one of BIPA's primary battlegrounds as litigants argue about potential class sizes and damages awards.
Features
The California Consumer Privacy Act: Everything You Wanted to Know But Were Afraid to Ask — 100 Days Out
Part Two of a Two-Part Article Part One of this article, last issue, covered how the CCPA applies to businesses — both in and outside California, the revenue threshold, proposed amendments and other open issues. Part Two continues with the rights that CCPA grants to Californians, the CCPA's impact on company privacy policies, how other states' privacy laws compare to the CCPA, exceptions and penalties for violating the Act.
Features
As Hackers Get Smarter, Can Law Firms Keep Up?
"It's Not the Hardware You Worry About, It's the Mistake That Someone Makes That Inadvertently Gives a Bad Actor Access." The legal industry has poured significant resources into cybersecurity, leading to huge leaps in progress in the last decade. But there are areas where large and small law firms can do much better in preventing and reacting to data breaches, and the legal sector may risk falling behind other industries. That's partly because hackers are learning how to circumvent law firm security systems, leading to a continuous game of cat and mouse.
Features
New Study Shows Which States Lead in Privacy Protection Laws
General counsel who navigate the mishmash of state privacy laws may relate to a new study showing that individual U.S. states' privacy statutes are spread across a broad spectrum.
Features
Legal Tech: Crisis Control: Best Practices for Emergency E-Discovery and Incident Response
A set of steps and best practices that legal teams can follow to ensure thorough and efficient handling of e-discovery in crisis situations.
Features
Legal Tech: A Closer Look At 3 Summer Cases Concerning Lost Data
Summer 2019 put some interesting case law into the books. We'll take a look at three cases having to do with lost data and whether spoliation sanctions were levied.
Features
Security Worries for Online Video Game Companies
Fortnite video game developer Epic Games Inc. isn't just dodging digital adversaries — now it's been slammed with a class action lawsuit over a data breach.
Features
The California Consumer Privacy Act: Everything You Wanted to Know But Were Afraid to Ask — 100 Days Out
Part One of a Two-Part Article Responses to questions businesses frequently ask about the impacts of the CCPA. Implementation challenges inevitably will arise as a company works to apply these new requirements to its business practices. The time is now to start preparing for the CCPA, as well as for other new U.S. privacy laws that are likely to follow.
Features
Increasing Client Requirements: Securing Law Firms for the 21st Century
Gone are the days of "basic security." What used to be optional is now standard: two factor authentication, complex passwords, clean desk policies, data encryption at rest and in transit, mobile device management and up-to-the-minute patching. Clients expect these items to already be in place and are further expanding their expectations.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Don't Sleep On Prohibitions on the Assignability of LeasesAttorneys advising commercial tenants on commercial lease documents should not sleep on prohibitions or other limitations on their client's rights to assign or transfer their interests in the leasehold estate. Assignment and transfer provisions are just as important as the base rent or any default clauses, especially in the era where tenants are searching for increased flexibility to maneuver in the hybrid working environment where the future of in-person use of real estate remains unclear.Read More ›
- Developments in Distressed LendingRecently, in two separate cases, secured lenders have received, as part of their adequate protection package, the right to obtain principal paydowns during a bankruptcy case.Read More ›
