Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

NY AG Proposes Stricter Data Security Laws Citing Equifax Breach Image

NY AG Proposes Stricter Data Security Laws Citing Equifax Breach

Josefa Velasquez

Following the Equifax Inc. breach that compromised personal information of 145.5 million Americans including more than 8 million New Yorkers, Attorney General Eric Schneiderman is proposing comprehensive legislation to tighten data security laws

Features

Data Integrity and Incident Response Image

Data Integrity and Incident Response

Benjamin Dynkin, Barry Dynkin & E.J. Hilbert

The skill required to successfully exfiltrate 143 million records is certainly sufficient to successfully attack the integrity of that very same data. It is generally accepted that cyber criminals have not performed integrity attacks because there is a minimal profit motive: Records have a black-market value; in integrity attacks, there is no deliverable that can be sold. This paradigm may be shifting.

Features

Uber In-House Attorney Out Behind Massive Cyberattack That Went Undisclosed Image

Uber In-House Attorney Out Behind Massive Cyberattack That Went Undisclosed

Stephanie Forshee & Jennifer Williams-Alvarez

<b><i>The Company Failed to Notify 57 Million Users of a Breach In October 2016. Two Employees Tasked with Handling the Response Process Have Left the Company, Including Uber In-House Attorney Craig Clark, Who Reported to the Company's Chief Security Officer.</b></i><p>Uber Technologies Inc. failed to notify 57 million users that their data was exposed in a breach, according to a company blog post published on November 21, which was confirmed by a source close to the matter.

Features

<b><i>Legal Tech</b></i><br>Circumstantial Evidence vs. Speculation: What Warrants e-Discovery Sanctions Image

<b><i>Legal Tech</b></i><br>Circumstantial Evidence vs. Speculation: What Warrants e-Discovery Sanctions

Mike Hamilton

In today's political climate, it has almost become "normal" that people frivolously make speculative statements without any proof that the statement is true. While this may be standard practice in the political world, in court this practice will not be convincing to any judge, especially when making an argument for e-discovery sanctions based on new rule FRCP 37(e).

Features

Ransomware: What to Do When It Happens to You Image

Ransomware: What to Do When It Happens to You

Kiran Raj & Mallory Jensen

In the event that your company is the victim of a ransomware attack, this article provides steps to be taken as part of its response to such an incident.

Features

Security First Approach Provides a Significant Advantage to Law Firms Image

Security First Approach Provides a Significant Advantage to Law Firms

Mark Sangster

Security first is a holistic approach that views security not as an information technology nuisance in need of tight cost-management controls, but as a competitive advantage to differentiation from traditional business offerings. Here's what you need to know.

Features

Podcast: Phishing Image

Podcast: Phishing

Jason Thomas

Phishing is one of the more pervasive cyber attacks in the world, and while we've all received phishing emails, phishing attacks have become more sophisticated and come in different forms other than emails from Persian princes.

Features

What Lies Beneath the Surface: The Dark Web Image

What Lies Beneath the Surface: The Dark Web

Elizabeth Vandesteeg & Jeffrey Goldberg

This article provides a basic outline of the structure of the Web and some insight as to the purpose for and content housed on each level, as well as give some practical tips to avoid your company's data from ending up on the Dark Web.

Features

When Products Start Teaching Cybersecurity Process Image

When Products Start Teaching Cybersecurity Process

Jared Coseglia

<b><i>New Nuix Cybersecurity Training and Certification Point to Pivot Not Only In Company But In Community At Large</b></i><p>Getting certifications from Nuix is no longer just about mastery of its engine. With a new certification coming to market next quarter, Nuix, like many in the ESI and forensic space (namely Guidance Software, now OpenText), is shifting gears and driving directly into the race for cybersecurity supremacy in an evolving and currently fractured technology marketplace.

Features

The Dark Web Image

The Dark Web

Elizabeth Vandesteeg & Jeffrey Goldberg

The goals of this article are: 1) to provide a basic outline of the structure of the Web and to provide some insight into the purpose for and content housed on each level; and 2) to give some practical tips on preventing your company's data from ending up on the Dark Web.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Law Firms and the Rise of Hospitality
    The law firm office cannot remain unchanged, as if frozen in time set to some date prior to the onset of pandemic, when the terms and meaning have all changed. In fact, the office must now provide benefits or an experience the lawyers and staff cannot get at home.
    Read More ›
  • Disconnect Between In-House and Outside Counsel
    'Disconnect Between In-House and Outside Counsel is a continuation of the discussion of client expectations and the disconnect that often occurs. And although the outside attorneys should be pursuing how inside-counsel actually think, inside counsel should make an effort to impart this information without waiting to be asked.
    Read More ›
  • Lack of Logo Placement At Center of Ruling Over Meat Loaf Album Packaging
    To build visibility for its brand, a record label or production company will want its logo included on products containing its master recordings manufactured and distributed by third parties. This will be addressed in the agreement between the label or production company and manufacturer/distributor. The failure to include the logo may raise a host of issues, from the breadth of the logo-placement obligation ' such as whether it includes Internet downloads ' to the proper theory on which to base any damages and just which album-sales figures are subject to evidentiary discovery. A recent ruling by the U.S. Court of Appeals for the Sixth Circuit ' in a long-running dispute between Cleveland International Records and Sony Music Entertainment ' illustrated how these issues may be argued and decided.
    Read More ›