Features

Password-Sharing May Be a Federal Crime under the Muddied Waters of the CFAA
The Computer Fraud and Abuse Act (CFAA) is a federal statute that provides for not only criminal liability, but also civil liability, when a person accesses…
Features

Cybersecurity Spending at Law Firms, Legal Departments Is Predicted to Increase in 2018
As law firms and legal departments finalize their 2018 budgets, many lawyers in both the United States and Canada plan to increase cybersecurity spending.
Features

<i>Legal Tech:</i> Peril in Paper: <i>EEOC v. GMRI</i> and the Digital Divide in e-Discovery Sanctions
There was a time not so long ago when the term “e-discovery” didn't exist. It was known simply by its legal name, discovery. We're now entering an era where some observers feel the term will fade into history, returning us back to simply calling it discovery.
Features

The Uber Breach and the Need for an Independent Privacy Function
Uber has incurred significant legal and reputational exposure as a result of the way that the company handled the breach. In the coming months, there will be a great deal of information and regulatory and judicial action that will act as guidance, or more precisely, a checklist of what-not-to-do, for companies that suffer a data breach.
Features

How Blockchain Technology Can Drive the Legal Industry Forward
A new legal structure that bestows and monitors trust must be employed. Is decentralization of traditional, gigantic central bank repositories of data the answer? Is blockchain technology the new path that the legal industry should take to sustain in the digital age? Let us consider the most significant implications of decentralized technologies to the legal industry.
Features

Regulators are Catching Up to Cryptocurrency and Blockchain Technology within the Financial Services Industry
<b><i>Part Two of a Two-Part Article</b></i><p>The proliferation of cryptocurrency and blockchain is being driven by the efficiencies and protections afforded to early adopters. The operational efficiencies and resulting cost savings are readily apparent in the financial services industry and are equally coveted by the entities trying to implement them and by the customers who will benefit from the implementation. However, neither party can fully enjoy these benefits without first understanding and overcoming the various regulatory hurdles.
Features

Top Cybersecurity Takeaways from Relativity Fest 2017
Cybersecurity is a hydra of complexity. Keeping a grasp on it requires constant re-education. What no one tells you: managing your company's cyber vulnerability demands a willingness for personal vulnerability. Being honest about our cyber risks is painful. And scary.
Features

Artificially Intelligent Blockchain of Things: Examining Legal Tech's Biggest Buzzwords
<b><i>Panelists at ALM Cybersecure 2017 Delved Into the Year's Biggest Legal Technology Buzzwords and the Hype Fueling Their Popularity</i></b><p>Legal technology has no shortage of buzzwords. The latest slew to take the industry by storm were the topic conversation in a Dec. 5 panel at ALM's CyberSecure event in New York.
Features

The Impact of the Surge of Biometric Data Privacy Lawsuits Against Employers
The growing acceptance of biometric data as a form of identification for employees means that many employers will likely have to face issues covered in state legislation in the immediate future.
Features

<i>Legal Tech:</i>Looking Ahead: 2018 Legal Technology Predictions
At law firms and legal departments, preparing for the new year should mean looking back at the last year and prioritizing revenue-driving activities, identifying strategies to grow your firm or company while mitigating risk and budgeting for new projects to meet client demands.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- "Holy Fair Use, Batman": Copyright, Fair Use and the Dark KnightThe copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.Read More ›