Features

Georgia Gov. Deals a Blow to Controversial Cybersecurity Bill
Gov. Nathan Deal opted to veto a cybersecurity bill criticized by technology groups that would have made “unauthorized computer access” a crime.

Are U.S. Records Retention Requirements on a Collision Course with the GDPR's 'Right to Erasure?'
U.S. laws require companies to retain records for years, and sometimes forever, and violating U.S. records retention laws can result in domestic fines and penalties. How can U.S. companies comply with the GDPR's "right to erasure" while still fulfilling their U.S. records retention obligations?
Features

Are U.S. Records Retention Requirements on a Collision Course with the GDPR's 'Right to Erasure?'
U.S. laws require companies to retain records for years, and sometimes forever, and violating U.S. records retention laws can result in domestic fines and penalties. How can U.S. companies comply with the GDPR's “right to erasure” while still fulfilling their U.S. records retention obligations?
Features

Vendor Risk Management for Law Firms: 7 Steps to Success
Most firms have extensive cybersecurity measures in place, but emerging or unclear regulatory requirements embroil them in a never-ending cycle of evaluation, best-practices review, and implementation. Firms don't just need to have their own systems secured; a responsible firm must also reduce the risk of breach at their third-party vendors. As cloud service providers become commonplace, so too does a firm's responsibility to ensure their vendors are managing risk appropriately.
Features

How Law Firms Can Prepare for FinTech Wave
<i><b>The Innovations and Industry Disruption Should Have Law Firms Snapping to Attention</b></i><p>The world of financial services is being upended by new technologies — from virtual currencies and blockchain to peer-to-peer lending and enhanced mobile banking — that are capturing customers, as well as the attention of Wall Street investors and industry regulators.
Features

You're Going to Need a Bigger Boat
<b><i>Small Law Firms Face Large Regulatory Requirements</b></i><p>Unlike large firms with comparable resources with which to protect client non-public information, small firms can find themselves trapped between cyberattacks, like ransomware, that don't prejudice based on the size of firm, and regulators who are indifferent to your size, when investigating a potential violation.
Features

Founders of Cryptocurrency-Focused Tech Company Face Federal Fraud Charges
Two heads of a tech company that raised tens of millions through an initial coin offering for what was sold as the world's first multi-blockchain debit card now face federal civil and criminal charges for allegedly defrauding investors.
Features

The Power of Certifications In the Legal Industry
<b><i>Part One of a Two-Part Article</b></i><p>The key paths and the corresponding certifications available for lawyers — and nonlawyers — to pursue to help successfully administer a career in the legal industry in the coming decade.
Features

Key Tech Terms to Know: Archives, Backups, Disaster Recovery and “as-a-Service”
A few essential definitions, intended to provide clarity and guidance to firms that are exploring how to improve their data compliance, protection and recovery posture.
Features

<i>E-Discovery:</i> Streamlining the Admissibility of ESI: Amendments to Federal Rule of Evidence 902
The new provisions of F.R.E. 902 bring the rule into the digital age, streamlining the process of authenticating electronically stored information and admitting it into evidence.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The 'Sophisticated Insured' DefenseA majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.Read More ›
- The Brave New World of Cybersecurity Due Diligence in Mergers and Acquisitions: Pitfalls and OpportunitiesLike poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.Read More ›
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric CodeIn an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.Read More ›
- The New York Uniform Commercial Code Comes of AgeParties in large non-consumer transactions with no connection whatsoever to New York often choose its law to govern their transactions, and New York statutes permit them to do so. What most people do not know is that the New York Uniform Commercial Code is outdated.Read More ›