Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

How Law Firms and Legal Departments Can Protect Against Meltdown and Spectre Image

How Law Firms and Legal Departments Can Protect Against Meltdown and Spectre

Adam Schlagman

In January, news of the Meltdown and Spectre vulnerabilities rocked the cybersecurity world. And even a few months later, the news is still reverberating, due to several patches that are significantly slowing down device and system performance. To learn more about these vulnerabilities and how law firms and legal departments can protect against them now and in in the future, I sat down with Dana Simberkoff, Chief Risk, Privacy and Information Security Officer at AvePoint.

Features

China's Cybersecurity Law Isn't Just About Cybersecurity Image

China's Cybersecurity Law Isn't Just About Cybersecurity

Rhys Dipshan

The law — which includes data localization mandates, cybersecurity best practices, and data transfer restrictions — has similarities to other cyber laws such as the EU's General Data Protection Regulation (GDPR). But in this case, it's also being used to police internet content and behavior.

Features

Supreme Court Asked, Again, to Weigh In on Data Breach Standing as Circuit Split Widens Image

Supreme Court Asked, Again, to Weigh In on Data Breach Standing as Circuit Split Widens

Craig A. Newman & Jonathan Hatch

CareFirst, a large health care company involved in a data breach case, asked the U.S. Supreme Court to weigh in on whether victims can establish Article III standing to sue for the risk of future identity theft. The Court denied the request, leaving intact a recent district court holding that consumers could successfully plead such a claim issue — and leaving a split among the federal appellate courts.

Features

<i>Case Study:</i> How Mesa Systems Resolved Its Phishing Issues Image

<i>Case Study:</i> How Mesa Systems Resolved Its Phishing Issues

Steven Davidson

Phishing is a constantly changing landscape, which requires unwavering attention and focus.

Features

<i>Online Extra</i>: e-Discovery Pioneer, Judge Andrew Peck, Retires Image

<i>Online Extra</i>: e-Discovery Pioneer, Judge Andrew Peck, Retires

Ian Lopez

<b><i>One of e-Discovery's Most Influential Figures</b></i><p>After over two decades as a magistrate judge for the Southern District of New York, Peck will retire and join DLA Piper.

Features

<i>e-Discovery:</i> Four Cases Highlighting e-Discovery Trends in the Second Half of 2017 Image

<i>e-Discovery:</i> Four Cases Highlighting e-Discovery Trends in the Second Half of 2017

Mike Hamilton

In the second half of 2017, case law served to clarify what does and does not constitute reasonable policies and procedures for preserving information subject to discovery — as well as the risks you run if you fail to follow through on those policies.

Features

Use of the Blockchain to Contract Digitally Image

Use of the Blockchain to Contract Digitally

Paige M. Boshell

Smart contracts are self-executing agreements written in code on the blockchain. Parties contract digitally using distributed ledger technology. This article offers a layperson's, non-technical summary of the underlying technology and consideration of certain legal implications for smart-contracting and contract management.

Features

Law Firm Security Q&A Image

Law Firm Security Q&A

Adam Schlagman

With the Appleby data breach still top of mind of many law firm and legal department professionals, cybersecurity has become a major area of concern. To learn more about how law firms can protect themselves against cyber attacks and data breaches, we sat down with Laurie Fischer, managing director at HBR Consulting.

Features

Second Edition ABA Cybersecurity Handbook Reflects the Need for Greater Awareness Image

Second Edition ABA Cybersecurity Handbook Reflects the Need for Greater Awareness

Mark Sangster

As 2017 came to a close, the American Bar Association opened the next chapter in cybersecurity awareness with the release of the second edition of its…

Features

Password-Sharing May Be a Federal Crime under the Muddied Waters of the CFAA Image

Password-Sharing May Be a Federal Crime under the Muddied Waters of the CFAA

Shain Khoshbin & Aaron Dilbeck

The Computer Fraud and Abuse Act (CFAA) is a federal statute that provides for not only criminal liability, but also civil liability, when a person accesses…

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The FTC Gets Into the College Athlete NIL Game
    As national champions are crowned in men's and women's basketball, hundreds of thousands of college athletes are entering the influencer marketplace for the first time and now find themselves attractive candidates in the fast growing influencer marketing arena. With influencer marketing potentially providing a 5x return on investment, many brands are eager to get into the industry, but it doesn't come without risks as the FTC Commissioner is taking a closer look at the use of influencers for marketing.
    Read More ›