Features

Get Ready for California's Version of the EU General Data Protection Regulation
The entertainment industry is intensely focused on data collection and analytics as it seeks to maximize the exploitation of digital content. Just as those of us in the privacy field had begun to have a slight breather as much of the heavy lifting on the GDPR was finally behind us, lawmakers in California have passed the California Consumer Privacy Act of 2018 (CCPA).
Features

General Data Protection Regulation: Defense or Offense?
Ostensibly, GDPR's mission is to strengthen and unify the EU's protection of online privacy rights and promote data protection for citizens of the 28 countries currently in the EU. In the global economy, however, GDPR serves as an alarm to all countries with business flowing across Europe and well beyond. Where business flows, data follow.
Features

Measuring Success in Cybersecurity
Cybersecurity concerns are akin to health concerns. You can practice a healthy lifestyle; you can get regular medical check-ups; you can be vigilant in monitoring your own body. Still, the question remains, “How do I know I'm healthy?” The answer is, “You don't.”
Features

Five Takeaways from Recent Cybersecurity Developments by Colorado and the SEC
Colorado recently adopted a new law expanding companies' obligations in the event of a cybersecurity incident, and establishing new data security and disposal obligations. Recent announcements by the SEC likewise emphasize important responsive points for both companies and their personnel in the wake of an incident. Five key takeaways from these developments are highlighted in this article.
Features

Protecting Privilege Before and After a Cyber Breach
Critical to any counsel working to prevent a cyber attack or respond to a successful cyber intrusion is an understanding of why and how to properly utilize both attorney-client and work-product privilege.
Features

Is Gmail's New Ephemeral Messaging Service a Threat to Data Retention?
Despite some potential problems with widespread use of Gmail's 'confidential mode,' the new ephemeral messaging function can be easily managed from an information governance perspective.
Features

Legal Tech: Approaches and Considerations for Discovery Cost Minimization and Recovery
The costs of litigation increase with ever more potentially responsive data, litigation technology options, and a truly global reach in the context of much litigation. In response, law firms must continue to consider viable approaches to broaching discussions surrounding the recovery of these costs both within the firm and, more importantly, with law firm clients.
Features

Pitching Your Cybersecurity Case to Law Enforcement Agencies
This article focuses on the unique issues that arise in a specific but increasingly common scenario: when your client is the victim of a cybercrime.
Features

Case Study: How Momkus McCluskey Virtualized Its IT for Better Security and Productivity
Whatever direction we went with our IT, we wanted to make sure we would be following the absolute best practices from a security perspective. I needed to know that our data would be safe, secure, as well as fully backed up in case something went wrong.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- When Is a Repair Structural or Nonstructural Under a Commercial Lease?A common question that commercial landlords and tenants face is which of them is responsible for a repair to the subject premises. These disputes often center on whether the repair is "structural" or "nonstructural."Read More ›
- Beach Boys Songs Written Decades Ago Triggered Current Quarrel With LawyersThere's current litigation in the ongoing Beach Boys litigation saga. A lawsuit filed in 2019 against Nevada residents Mike Love and his wife Jacquelyne in the U.S. District Court for the District of Nevada that alleges inaccurate payment by the Loves under the retainer agreement and seeks $84.5 million in damages.Read More ›
- Supreme Court Rules Rejection of Trademark License Does Not Rescind Rights of LicenseeMission Product Holdings, Inc. v. Tempnology, LLC The question is whether a debtor's rejection of its agreement granting a license "terminates rights of the licensee that would survive the licensor's breach under applicable nonbankruptcy law."Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Recently Introduced Bill Would Limit ITC 'Domestic Industry by Subpoena'Patent infringement disputes in the United States are not only heard in district courts. The U.S. International Trade Commission (ITC) also decides high-stakes intellectual property disputes — with the remedy for the IP rights holder not being damages, but rather an exclusion order that can block a competitor's importation of infringing articles into the U.S. That remedy can be incredibly powerful for companies engaged in stiff competition in the U.S. market.Read More ›