Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Fighting Biometric Fraud on the Blockchain Image

Fighting Biometric Fraud on the Blockchain

Alastair Johnson

The use of SMS verification codes as a security measure has recently been exposed as a mere stop-gap solution because of the ability of hackers to fraudulently take over phone numbers. Biometrics meanwhile is proving to be one of the best new technologies to combat fraud and identity theft.

Features

Federal Data Privacy Legislation Is Likely Next Year, Tech Lawyers Say Image

Federal Data Privacy Legislation Is Likely Next Year, Tech Lawyers Say

Dan Clark

For Years, Federal Legislators Have Attempted to Pass Comprehensive Cybersecurity and Data Privacy Legislation. With More Support Than Ever from the Public, Industry and Both Sides of the Political Spectrum, 2019 May Be the Year When Such Legislation Is Enacted.

Features

Prepping a Mock Notification Letter Before a Cybersecurity Breach Hits Image

Prepping a Mock Notification Letter Before a Cybersecurity Breach Hits

Stephen Moore

Being prepared for the worst before it even happens can minimize the damage in the event of a cybersecurity incident. To get any company ready for a cybersecurity event, the first step is to organize a team to write a mock breach notification letter that will represent your message to the world about your failure in the event you have a breach.

Features

Legal Tech: Moving to the Cloud for Business Continuity Planning Image

Legal Tech: Moving to the Cloud for Business Continuity Planning

Jonathan Reed

In the past year, the devastation caused by natural disasters has been immense. Law firms, like every other business, are left to deal with the aftermath of these catastrophic events. Firms that have established business continuity plans to put into effect when these instances occur will find themselves a step ahead in the disaster recovery process. And the ones leveraging cloud technology are at an even greater advantage.

Features

Sticking a Hand in the Internet Cookie Jar Image

Sticking a Hand in the Internet Cookie Jar

Jeffrey Higel, Michael Bahar & Mike Nelson

Why Collecting Children's Online Data is a Risk As convenient, useful and cool mobile technology and interconnected devices are, they come with risks that remain largely unseen or, worse, ignored. For manufacturers, they also pose regulatory litigation, and insurance risks, especially when children end up using their "smart" products.

Features

Are You Prepared? Dealing with GDPR-like Rules Spreading Across the Nation Image

Are You Prepared? Dealing with GDPR-like Rules Spreading Across the Nation

Mark Sangster

California's Consumer Privacy Act, signed into law earlier this year, follows a growing line of consumer privacy laws, such as the European General Data Protection Regulations (GDPR), Canadian Breach of Security Safeguards Regulations of the Personal Information Protection and Electronic Documents Act (PIPEDA), and related New York Department of Financial Services Cybersecurity Rules and Regulations (NYCRR 500).

Features

Right Out of the Box: California Enacts First-of-its-Kind Statute Regulating Internet-of-Things Image

Right Out of the Box: California Enacts First-of-its-Kind Statute Regulating Internet-of-Things

Michael Bahar, Frank Nolan & Trevor Satnick

<b><i>Companies Impacted By California's SB-327 — Especially Manufacturers and Distributors of IoT Devices — Should Work to Ensure Compliance With the Act As Soon As Possible If Regulatory Fallout Is to Be Avoided Come January 2020</b></i><p>While a great deal of attention has focused on the California Consumer Privacy Act, California also passed a less-publicized, but highly critical, statute that will regulate certain aspects of Internet of Things device security.

Features

How Legal Teams Can Leverage AI Image

How Legal Teams Can Leverage AI

Rebecca Yoder

Artificial intelligence and automation are creeping into the workplace of every industry, bringing the added benefits of efficiency and security. As more organizations implement AI solutions across their departments, businesses still relying on outdated, manual processes will fall behind.

Features

The Blockchain Can Finally Secure Supply Chains Against Cyberattacks Image

The Blockchain Can Finally Secure Supply Chains Against Cyberattacks

Adrian Clarke

Cyber criminals looking for new ways to exploit company networks are turning their focus to the privileged network access given to the many players involved in supply chains. As supply ecosystems grow, and points of vulnerability proliferate, businesses will have to turn to distributed ledger technology.

Features

Worried About Complying with ABA Opinion 483 on Cybersecurity? Fear No More Image

Worried About Complying with ABA Opinion 483 on Cybersecurity? Fear No More

Larry J. Hershman & Jeffrey S. Brenner

In response to the omnipresent threat of cyberattacks, the ABA issued Formal Opinion 483, which addresses the obligations imposed upon lawyers to safeguard their clients' data. Here's how to achieve compliance.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Disconnect Between In-House and Outside Counsel
    'Disconnect Between In-House and Outside Counsel is a continuation of the discussion of client expectations and the disconnect that often occurs. And although the outside attorneys should be pursuing how inside-counsel actually think, inside counsel should make an effort to impart this information without waiting to be asked.
    Read More ›
  • Holders of Unredeemed Gift Cards Denied Bankpruptcy Priority
    For some time now, the brick and mortar side of the retail industry has been in financial distress. In 2015 and 2016 alone, brand-name ­companies such as Sports Authority, RadioShack, Aéropostale, American Apparel, Eastern Mountain Sports and City Sports sought bankruptcy protection. A common question in these cases is how to treat holders of unredeemed gift cards. Are they near the back of the line with other general unsecured creditors, or are they entitled to “priority” payment status under the Bankruptcy Code?
    Read More ›