Features

FINRA Report on Best Cybersecurity Practices Is Must-Read, Alston & Bird Lawyer Says
<b><i>Cybersecurity Practices Must “Be Appropriately Tailored to the Entity. It Should Be Risk-Based, Based on Risk to Your Organization.”</b></i><p>The recently released FINRA report provides guidance for broker-dealer firms of various sizes on how they can mitigate the risks of cyberattacks and data theft by other means.
Features

Legal Tech: Winter 2019 E-Discovery Case Law Review
As a practice, e-discovery involves professionals from a variety of disciplines. For this case law review, we spoke with professionals who play different roles in the e-discovery process to identify three case law rulings from 2018 that stood out in the impact they have on how e-discovery is practiced today.
Features

2019 Trends Overview: Compliance, Privacy and Security Family Tree
In 2019, regulations and laws will continue to define how businesses collect and use consumer data, and their obligations to protect this data from misuse, theft or exposure to unauthorized parties.
Features

Causation and Harm In Data Breach Litigation
Demonstrating that a data breach has resulted in an injury-in-fact can be difficult, because it is not always clear what has happened or will happen with the stolen data.
Features

Implications of GDPR & CCPA on Public Records
This article discusses the importance of securing a safe harbor for court records through reviewing an illustrative example of how a European Union (EU) citizen was able to force U.S. legal technology companies to remove and alter court records using GDPR.
Features

Legal Operations Chiefs Say Managing Technology and Cutting Costs Are Main Priorities, Not Blockchain or AI
In-house legal operations chiefs see their main priorities as managing legal technology and cost-cutting, primarily on outside counsel spending. Blockchain remains a confusing concept to them, while artificial intelligence is the hottest topic of conversation.
Features

'Dark Overlord' Hack Shows Mounting Cyber Risks for Law Firms
<b><i>The Hacker Group Wants Ransom Payments from Dozens of Firms Involved In the Sept. 11 Litigation, and Experts Warn That More Attacks Are Coming</b></i><p>Leaders of those law firms are all likely scratching their heads about how to handle a recent announcement from a nebulous hacker entity calling itself the “Dark Overlord,” which claims to be in possession of 18,000 legal and insurance documents pertaining to the court fight.
Features

Are Cybersecurity Solutions and Consulting a New Revenue Stream for Law Firms?
The Big 4 accounting firms have identified legal services as an area for growth beyond traditional financial services and consulting services.
Features

Cloudy With a Chance of IoT attacks: The Cybersecurity Forecast for 2019
2018 was a trying year for the cybersecurity industry, with breaches increasing and showing no signs of slowing as we enter the New Year. 2019 will bring its own threats with the propagation of new technology — 5G and IoT — and their security vulnerabilities. However, there's also progress on the horizon, thanks to more stringent government regulation and increasing legal action.
Features

What the U.S.' Pursuit of Foreign Nation-State Hackers Means for Cybercrime Victims and Targets
For years, the U.S. has maintained an active enforcement campaign against overseas cyber criminals and while these past efforts have not been haphazard, they have not necessarily been part of a specific drive to address the serious issue of foreign cybercrime committed by nation states. Recent announcements by the DOJ show that this enforcement campaign is accelerating and expanding.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- "Holy Fair Use, Batman": Copyright, Fair Use and the Dark KnightThe copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.Read More ›