Features

A Playbook for CRM Adoption
Here's the playbook for disruption: Take attorneys out of the equation. Stop building CRM that succeeds or fails on their shoulders. We need to shift the focus and, instead, build the technology from the ground up for the professionals who actually use it: marketing and business development.
Features

7 Recommendations for Social Media Influencers and Companies to Protect Themselves Against Copyright Issues
By understanding some of the risks posed by copyright law and by following the above recommendations, influencers and brands can protect their creative works and reputations and build a mutually beneficial partnership.
Features

Compliance Requirements of CISA's Proposed Cyber Incident Reporting Rule
This article focuses on the requirements of CISA's proposed cyber incident reporting rule, the compliance requirements for covered entities and the steps entities can take to protect themselves.
Features

Protecting Privacy and Sensitive Data In Era of Neurotechnologies
Scientists have been collecting neural data from the brain for medical reasons for years, with myriad regulatory constraints in place. But in 2024, technologies are moving fast and furiously into the realm of consumer products.
Features

Gen-AI Created Influencers Bring New Risks
A steep rise in the use of GenAI and computer-generated influencers brings with it new marketing risks and considerations for celebrities, influencers and businesses alike.
Features

Big Law Looks To Influence Vendor-Developed AI
In the AI edition of the classic "build versus buy" dilemma, some marquee firms have opted to leverage their position as the largest buyers of legal tech to influence vendor development of AI-powered services to suit their needs.
Features

China Finalizes New Regulations to Relax Personal Data Exports from China
Nearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.
Features

The Perfect Storm: Why Contract Hiring In Privacy Will Eclipse Direct Hiring In 2024
With significantly fewer fully remote positions available in 2023, active job seekers were faced with the question of whether to begin considering compromises on work-from-home flexibility or compromise in other areas like compensation, vertical mobility, quality of life, or employment modality.
Features

Lessons for CISOs from the SolarWinds Breach and SEC Enforcement
In an era where digital threats loom large, the responsibilities of Chief Information Security Officers have expanded beyond traditional IT security to encompass a broader governance, risk management, and compliance role. The infamous SolarWinds Corp. attack illustrates the complex cybersecurity landscape CISOs navigate.
Features

Shielding Law Practices: Mitigating Vendor Risks to Safeguard Client Confidentiality
Because vendors often access clients' internal systems, customer data, and intellectual property, they will always be a magnet for hackers searching for valuable data. Bad actors will always look for the weak spots in a firm's defenses, including those deployed by a firm's vendors and other third parties. And signs point to a growing number of cyberattacks, not a lessening of them.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Beach Boys Songs Written Decades Ago Triggered Current Quarrel With LawyersThere's current litigation in the ongoing Beach Boys litigation saga. A lawsuit filed in 2019 against Nevada residents Mike Love and his wife Jacquelyne in the U.S. District Court for the District of Nevada that alleges inaccurate payment by the Loves under the retainer agreement and seeks $84.5 million in damages.Read More ›
- Issue-Specific Withdrawal of the ReferenceThis article considers the genesis, tendency and scope of the district courts' withdrawals of the reference in some of the more complex proceedings pending today.Read More ›
- Transfer Tax Implications on Real Property LeasesThe real property transfer tax does not apply to all leases, and understanding the tax rules of the applicable jurisdiction can allow parties to plan ahead to avoid unnecessary tax liability.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Settlement Privilege and the Threat of Legal ActionPart One of this article considers the issue of when a threat to litigate encased by a settlement demand raises the specter of extortion, and the extent to which a potentially extortionate settlement communication should be outside the scope of the privilege.Read More ›