Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Are You Prepared? Dealing with GDPR-like Rules Spreading Across the Nation Image

Are You Prepared? Dealing with GDPR-like Rules Spreading Across the Nation

Mark Sangster

California's Consumer Privacy Act, signed into law earlier this year, follows a growing line of consumer privacy laws, such as the European General Data Protection Regulations (GDPR), Canadian Breach of Security Safeguards Regulations of the Personal Information Protection and Electronic Documents Act (PIPEDA), and related New York Department of Financial Services Cybersecurity Rules and Regulations (NYCRR 500).

Features

Right Out of the Box: California Enacts First-of-its-Kind Statute Regulating Internet-of-Things Image

Right Out of the Box: California Enacts First-of-its-Kind Statute Regulating Internet-of-Things

Michael Bahar, Frank Nolan & Trevor Satnick

<b><i>Companies Impacted By California's SB-327 — Especially Manufacturers and Distributors of IoT Devices — Should Work to Ensure Compliance With the Act As Soon As Possible If Regulatory Fallout Is to Be Avoided Come January 2020</b></i><p>While a great deal of attention has focused on the California Consumer Privacy Act, California also passed a less-publicized, but highly critical, statute that will regulate certain aspects of Internet of Things device security.

Features

How Legal Teams Can Leverage AI Image

How Legal Teams Can Leverage AI

Rebecca Yoder

Artificial intelligence and automation are creeping into the workplace of every industry, bringing the added benefits of efficiency and security. As more organizations implement AI solutions across their departments, businesses still relying on outdated, manual processes will fall behind.

Features

The Blockchain Can Finally Secure Supply Chains Against Cyberattacks Image

The Blockchain Can Finally Secure Supply Chains Against Cyberattacks

Adrian Clarke

Cyber criminals looking for new ways to exploit company networks are turning their focus to the privileged network access given to the many players involved in supply chains. As supply ecosystems grow, and points of vulnerability proliferate, businesses will have to turn to distributed ledger technology.

Features

Worried About Complying with ABA Opinion 483 on Cybersecurity? Fear No More Image

Worried About Complying with ABA Opinion 483 on Cybersecurity? Fear No More

Larry J. Hershman & Jeffrey S. Brenner

In response to the omnipresent threat of cyberattacks, the ABA issued Formal Opinion 483, which addresses the obligations imposed upon lawyers to safeguard their clients' data. Here's how to achieve compliance.

Features

Legal Tech: Cloud and Security Considerations for e-Discovery Image

Legal Tech: Cloud and Security Considerations for e-Discovery

Stephen Ehrlich

E-discovery presents some special considerations that need to be examined before deciding what is best for your organization and really taking a stand in the on-premises vs. cloud debate.

Features

Legal Tech: Cases Highlighting Judicial Discretion in Ordering E-Discovery Sanctions Image

Legal Tech: Cases Highlighting Judicial Discretion in Ordering E-Discovery Sanctions

Mike Hamilton

Three cases from the summer of 2018 reinforce some of the key themes of recent e-discovery case law

Features

Robbing a Locked Bank Vault from Home: Legal Issues Raised by Cryptocurrency Frauds  Image

Robbing a Locked Bank Vault from Home: Legal Issues Raised by Cryptocurrency Frauds 

Chris Ott

Cryptocurrency theft remains a major concern for traders and investors given that billions of dollars of cryptocurrency are stolen every year. These cutting-edge problems intersect in interesting ways with companies' existing fraud and anti-money laundering concerns, but it all starts with the cryptocurrency "wallet."

Features

U.S. Trade-Secret Theft Prosecutions Target China and Are on the Rise Image

U.S. Trade-Secret Theft Prosecutions Target China and Are on the Rise

Phillip Bantz

The U.S. and China are in the midst of an escalating trade war and the DOJ has been prosecuting trade misappropriation cases against China with notable vigor as of late.

Features

Elections: The Hidden Security Danger for Governments Image

Elections: The Hidden Security Danger for Governments

Roy E. Hadley, Jr.

The news is replete with alleged actions of foreign governments and hackers trying to impact the democratic election process in the United States. It is incumbent upon the state and local governments to ensure the security of all elections.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Lack of Logo Placement At Center of Ruling Over Meat Loaf Album Packaging
    To build visibility for its brand, a record label or production company will want its logo included on products containing its master recordings manufactured and distributed by third parties. This will be addressed in the agreement between the label or production company and manufacturer/distributor. The failure to include the logo may raise a host of issues, from the breadth of the logo-placement obligation ' such as whether it includes Internet downloads ' to the proper theory on which to base any damages and just which album-sales figures are subject to evidentiary discovery. A recent ruling by the U.S. Court of Appeals for the Sixth Circuit ' in a long-running dispute between Cleveland International Records and Sony Music Entertainment ' illustrated how these issues may be argued and decided.
    Read More ›
  • Law Firms and the Rise of Hospitality
    The law firm office cannot remain unchanged, as if frozen in time set to some date prior to the onset of pandemic, when the terms and meaning have all changed. In fact, the office must now provide benefits or an experience the lawyers and staff cannot get at home.
    Read More ›