Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

How Legal Teams Can Leverage AI Image

How Legal Teams Can Leverage AI

Rebecca Yoder

Artificial intelligence and automation are creeping into the workplace of every industry, bringing the added benefits of efficiency and security. As more organizations implement AI solutions across their departments, businesses still relying on outdated, manual processes will fall behind.

Features

The Blockchain Can Finally Secure Supply Chains Against Cyberattacks Image

The Blockchain Can Finally Secure Supply Chains Against Cyberattacks

Adrian Clarke

Cyber criminals looking for new ways to exploit company networks are turning their focus to the privileged network access given to the many players involved in supply chains. As supply ecosystems grow, and points of vulnerability proliferate, businesses will have to turn to distributed ledger technology.

Features

Worried About Complying with ABA Opinion 483 on Cybersecurity? Fear No More Image

Worried About Complying with ABA Opinion 483 on Cybersecurity? Fear No More

Larry J. Hershman & Jeffrey S. Brenner

In response to the omnipresent threat of cyberattacks, the ABA issued Formal Opinion 483, which addresses the obligations imposed upon lawyers to safeguard their clients' data. Here's how to achieve compliance.

Features

Legal Tech: Cloud and Security Considerations for e-Discovery Image

Legal Tech: Cloud and Security Considerations for e-Discovery

Stephen Ehrlich

E-discovery presents some special considerations that need to be examined before deciding what is best for your organization and really taking a stand in the on-premises vs. cloud debate.

Features

Legal Tech: Cases Highlighting Judicial Discretion in Ordering E-Discovery Sanctions Image

Legal Tech: Cases Highlighting Judicial Discretion in Ordering E-Discovery Sanctions

Mike Hamilton

Three cases from the summer of 2018 reinforce some of the key themes of recent e-discovery case law

Features

Robbing a Locked Bank Vault from Home: Legal Issues Raised by Cryptocurrency Frauds  Image

Robbing a Locked Bank Vault from Home: Legal Issues Raised by Cryptocurrency Frauds 

Chris Ott

Cryptocurrency theft remains a major concern for traders and investors given that billions of dollars of cryptocurrency are stolen every year. These cutting-edge problems intersect in interesting ways with companies' existing fraud and anti-money laundering concerns, but it all starts with the cryptocurrency "wallet."

Features

U.S. Trade-Secret Theft Prosecutions Target China and Are on the Rise Image

U.S. Trade-Secret Theft Prosecutions Target China and Are on the Rise

Phillip Bantz

The U.S. and China are in the midst of an escalating trade war and the DOJ has been prosecuting trade misappropriation cases against China with notable vigor as of late.

Features

Elections: The Hidden Security Danger for Governments Image

Elections: The Hidden Security Danger for Governments

Roy E. Hadley, Jr.

The news is replete with alleged actions of foreign governments and hackers trying to impact the democratic election process in the United States. It is incumbent upon the state and local governments to ensure the security of all elections.

Features

Why Do Cybersecurity Programs Fail? Image

Why Do Cybersecurity Programs Fail?

Chris Moschovitis

It seems this should be a key question for everyone in business, government, technology, and cybersecurity: If we know the problem with cybersecurity, and have ways of methods of addressing the problem, why are we still failing?

Features

Cybersecurity Ranks Among Top Concerns of Corporate Legal Departments Image

Cybersecurity Ranks Among Top Concerns of Corporate Legal Departments

Chris Maguire

A survey of more than 460 attorneys and decision makers working in corporate legal departments nationwide found that in-house teams, already stretched by limited resources, are confronting new and traditional challenges. Cybersecurity ranked among legal departments' biggest concerns for 2018.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • "Holy Fair Use, Batman": Copyright, Fair Use and the Dark Knight
    The copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.
    Read More ›