Features

Benchmarking Cybersecurity: CISOs and Security Leaders Share Perspectives on Managing Evolving Global Risks
30 security professionals are interviewed in a collective conversation about the cross-functional solutions they are applying to today's most complex challenges and the creative ways they are adapting to a perilous threat landscape.
Features

Law Firm Security Goes Back to School
Armed with technical and regulatory weapons for preventing cyber crimes, law firms must administer policies to protect client data and use the systems and services held standard by industries like medicine and banking. No one knows when disruption will take place. New methods of adverse action force executives to make more choices and decisions. All departments must merge their vigilance and join with IT services as IT takes center stage in order to stay prepared.
Features

How Law Firms and Legal Departments Can Protect Against Meltdown and Spectre
In January, news of the Meltdown and Spectre vulnerabilities rocked the cybersecurity world. And even a few months later, the news is still reverberating, due to several patches that are significantly slowing down device and system performance. To learn more about these vulnerabilities and how law firms and legal departments can protect against them now and in in the future, I sat down with Dana Simberkoff, Chief Risk, Privacy and Information Security Officer at AvePoint.
Features

China's Cybersecurity Law Isn't Just About Cybersecurity
The law — which includes data localization mandates, cybersecurity best practices, and data transfer restrictions — has similarities to other cyber laws such as the EU's General Data Protection Regulation (GDPR). But in this case, it's also being used to police internet content and behavior.
Features

Supreme Court Asked, Again, to Weigh In on Data Breach Standing as Circuit Split Widens
CareFirst, a large health care company involved in a data breach case, asked the U.S. Supreme Court to weigh in on whether victims can establish Article III standing to sue for the risk of future identity theft. The Court denied the request, leaving intact a recent district court holding that consumers could successfully plead such a claim issue — and leaving a split among the federal appellate courts.
Features

<i>Case Study:</i> How Mesa Systems Resolved Its Phishing Issues
Phishing is a constantly changing landscape, which requires unwavering attention and focus.
Features

<i>Online Extra</i>: e-Discovery Pioneer, Judge Andrew Peck, Retires
<b><i>One of e-Discovery's Most Influential Figures</b></i><p>After over two decades as a magistrate judge for the Southern District of New York, Peck will retire and join DLA Piper.
Features

<i>e-Discovery:</i> Four Cases Highlighting e-Discovery Trends in the Second Half of 2017
In the second half of 2017, case law served to clarify what does and does not constitute reasonable policies and procedures for preserving information subject to discovery — as well as the risks you run if you fail to follow through on those policies.
Features

Use of the Blockchain to Contract Digitally
Smart contracts are self-executing agreements written in code on the blockchain. Parties contract digitally using distributed ledger technology. This article offers a layperson's, non-technical summary of the underlying technology and consideration of certain legal implications for smart-contracting and contract management.
Features

Law Firm Security Q&A
With the Appleby data breach still top of mind of many law firm and legal department professionals, cybersecurity has become a major area of concern. To learn more about how law firms can protect themselves against cyber attacks and data breaches, we sat down with Laurie Fischer, managing director at HBR Consulting.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The 'Sophisticated Insured' DefenseA majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.Read More ›
- The Brave New World of Cybersecurity Due Diligence in Mergers and Acquisitions: Pitfalls and OpportunitiesLike poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.Read More ›
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric CodeIn an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.Read More ›
- The New York Uniform Commercial Code Comes of AgeParties in large non-consumer transactions with no connection whatsoever to New York often choose its law to govern their transactions, and New York statutes permit them to do so. What most people do not know is that the New York Uniform Commercial Code is outdated.Read More ›