Features

Is Cyber-Risk Insurable?
In an environment of moving targets, it seems unimaginable that insurance against cybersecurity attacks can be robust enough to provide real protection. There are many types of risks involved, and some include physical damage to property.
Features

The Principles of Good Cyber Risk Management
Apart from headline grabbing attacks, we are now seeing an epidemic of cyber attacks. Concern has shifted from dealing with data being stolen and sold on the dark Web to handling serious ransomware and destructive attacks, where attackers are looking for immediate monetary output.
Features

Will the EU-Japan Data Transfer Partnership Agreement Have Global Influence?
With countries around the world examining and strengthening their data protection laws, this agreement could be the first of many and will undoubtedly have global repercussions.
Features

Second Circuit Blocks Video Privacy Suit Brought Against Barnes & Noble
A would-be class action against Barnes & Noble could have cost the bookseller hundreds of millions of dollars — not to mention a reputational hit for allegedly sharing private information about its customers' online video purchases with Facebook.
Features

Privacy Notices, Opt-In Clauses Debated as U.S. Regulators Shape Federal Privacy Law
Tech giants' privacy counsel and U.S. senators discussed opt-in policies, lengthy, legalese-filled privacy notices and location tracking. The discussion aimed to further shape a potential U.S. federal data privacy law.
Features

Legal Tech -- Behind the Tech: Client-Centric Innovation: The Evolution of the Casepoint Platform
<b><i>One In a Continuing Series of Articles Looking At Legal Tech Innovation and the Story Behind It</i></b><p>In seeing clients' pain-points and becoming intimately engaged with their internal processes, my colleagues and I resolved to address a problem that many of our clients may not have even known they could fix. Our overriding goal from the outset was to fill the efficiency void that was so obvious in all of the feedback we were receiving from clients across the board by developing a fully integrated, end-to-end legal workflow platform.
Features

On the Same Page: Blockchain for the Advertising Industry
While inflated expectations abound, the advertising industry is emerging as one of the more immediate, substantive and compelling use cases for blockchain technology.
Features

The Brave New World of Cybersecurity Due Diligence in Mergers and Acquisitions: Pitfalls and Opportunities
Like poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.
Features

Know Your Tech
Technologies are often pitched as solutions, if not game-changing solutions. Indeed, many times they are, but no solution comes without the seeds of its own costs and challenges. For pragmatic and regulatory compliance reasons, it is increasingly important for boards, senior executives and general counsel to sufficiently understand technologies, not just their potential promise.
Features

A Survey of Proposed Federal Privacy Legislation and the Year Ahead
The social, economic, and political forces pushing for a comprehensive overhaul of the nation's privacy regime are numerous, and many see 2019 as presenting the best opportunity yet for passage of federal data privacy legislation.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Beach Boys Songs Written Decades Ago Triggered Current Quarrel With LawyersThere's current litigation in the ongoing Beach Boys litigation saga. A lawsuit filed in 2019 against Nevada residents Mike Love and his wife Jacquelyne in the U.S. District Court for the District of Nevada that alleges inaccurate payment by the Loves under the retainer agreement and seeks $84.5 million in damages.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Conducting Discovery in JapanConducting discovery in Japan is not easy and litigants should not expect to obtain nearly the same quantity or quality of information from Japan. However, if you know the available discovery devices and the special procedures to take advantage of those devices, discovery may not be lost.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›