Features

DRaaS: How It Takes a Law Firm's DR Beyond Insurance
With expectations for an always-on law firm, significant challenges within the legal industry to maintain competitiveness and perform due practice for cybersecurity and other disaster scenarios come from both clients and regulatory bodies. A comprehensive approach with an end-to-end availability strategy is imperative to mitigate the threats of downtime. And yet, this is easier said than done.
Features

Procedures for Protecting Entertainment Domain Names Against Cybersquatters
Because there are so many new digital channels for possible intellectual property infringement, knowledge of the various mechanisms available to combat the issue is vital to enabling entertainment industry owners to protect their brand.
Features

The Equifax Breach: Why This One Is Different
This is not the first time that a credit reporting agency has been breached, nor is it the first time that Equifax has reported a breach. What <i>is</i> different with the current breach is its size and the nature of information compromised, as well as the implications of the breach in light of the increasingly complex web of cybersecurity regulations nationwide.
Features

5 Things to Know About the First Wave of Equifax Actions
With 143 million people potentially hit by Equifax Inc.'s data breach, there's no doubt there will lawsuits — a lot of them."You'll have suits in…
Features

There May Be 'No Do-Overs,' but SEC Hack Provides Important Security Lessons
Even the Securities and Exchange Commission (SEC) can get hacked — and the recently announced cyber attack against the SEC is providing an important wake-up call for U.S. companies regulated by the powerful agency and the attorneys they work with.
Features

Securing Your Information-Rich Employee Benefit Plans
Hackers have turned to a new information-rich source: employee benefit plans. This article examines the threat facing benefit plans, explores the applicable legal landscape, and recommends steps to better equip plans to prepare for and manage data breaches.
Features

<i>Legal Tech</i><br> Teaching an Old Dog New Tricks: Business Process Management and Law Firms
Though traditionally considered laggards when adopting new technology, law firms have recently started to explore new tricks to fortify performance across their organizations. While this evolution is critical to a firm's survival, it's important that firm administrators understand that substantive improvements are only possible through multi-directional change.
Features

A Dragonfly in the Ointment: Cyber Attacks on the Energy Sector May Signal Dark Days Ahead
Recent attacks may not yet have resulted in damages or disruption, but the group appears to be positioning itself to learn how the targeted energy facilities operate while attempting to gain access to operational control systems, if they have not done so already.
Features

Vendor Contracting for Privacy and Security
In an effort to continue to capture ongoing and new business, vendors may be opening themselves up to liability due to poorly drafted contracts with companies. In addition, in a rush by companies to have data shifted to the cloud, privacy concerns may be dangerously minimized.
Features

Industry Vendors Exploited Via Industry-Wide Cyber Attacks
<b><i>How to Protect Your Firm from Vendor Risks</b></i><p>The legal industry is still lulled into a false sense of security, mistakenly assuming that they are immune to a significant IT business outage, and that those unfortunate firms affected by cybercriminals were somehow lacking in adequate cybersecurity presages. That's simply not true. Even Achilles had a weak spot.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- The Brave New World of Cybersecurity Due Diligence in Mergers and Acquisitions: Pitfalls and OpportunitiesLike poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.Read More ›
- The 'Sophisticated Insured' DefenseA majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- The New York Uniform Commercial Code Comes of AgeParties in large non-consumer transactions with no connection whatsoever to New York often choose its law to govern their transactions, and New York statutes permit them to do so. What most people do not know is that the New York Uniform Commercial Code is outdated.Read More ›