Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

A Dragonfly in the Ointment: Cyber Attacks on the Energy Sector May Signal Dark Days Ahead Image

A Dragonfly in the Ointment: Cyber Attacks on the Energy Sector May Signal Dark Days Ahead

Michael Bahar, Trevor Satnick & Mark Thibodeaux

Recent attacks may not yet have resulted in damages or disruption, but the group appears to be positioning itself to learn how the targeted energy facilities operate while attempting to gain access to operational control systems, if they have not done so already.

Features

Vendor Contracting for Privacy and Security Image

Vendor Contracting for Privacy and Security

Chuck Kunz & Ian McCauley

In an effort to continue to capture ongoing and new business, vendors may be opening themselves up to liability due to poorly drafted contracts with companies. In addition, in a rush by companies to have data shifted to the cloud, privacy concerns may be dangerously minimized.

Features

Industry Vendors Exploited Via Industry-Wide Cyber Attacks Image

Industry Vendors Exploited Via Industry-Wide Cyber Attacks

Mark Sangster

<b><i>How to Protect Your Firm from Vendor Risks</b></i><p>The legal industry is still lulled into a false sense of security, mistakenly assuming that they are immune to a significant IT business outage, and that those unfortunate firms affected by cybercriminals were somehow lacking in adequate cybersecurity presages. That's simply not true. Even Achilles had a weak spot.

Features

Podcast: Implantable Microchips Image

Podcast: Implantable Microchips

Jason Thomas

Next in a series of podcasts looking at the cybersecurity and tech world.

Features

What's the Deal with WhatsApp: Investigating and Discovering Mobile Device Data? Image

What's the Deal with WhatsApp: Investigating and Discovering Mobile Device Data?

Julian Sheppard & Michele C.S. Lange

Analyzing data from mobile devices is still uncharted territory for many in Legal and IT. Accordingly, today's modern legal and technology professionals need to brush up on all things mobile. This includes understanding where applicable data resides in a mobile device and what common challenges are associated with accessing, preserving and extracting this data.

Features

Are 'Smart Contracts' Smart Enough? Image

Are 'Smart Contracts' Smart Enough?

Jonathan Bick

<b><i>Certain Legal Functions Can Be Automated with the Use of Blockchains</b></i><p>The automation of certain attorney functions has given rise to a new form of contracting, known as "smart contracts." Consequently, a decrease in the demand for certain attorney functions that can now be performed by Internet applications is matched by an increase in demand for legal advisers who can prepare smart contracts and ensure these smart contracts accurately reflect a desired business transaction.

Features

The Future Is Now: Global Litigation, Digital Workflows and Electronic Proceedings Image

The Future Is Now: Global Litigation, Digital Workflows and Electronic Proceedings

Charlie Harrel

Welcome to the new world of digital litigation, which is rapidly emerging in the context of an increasingly globalized world — a world where it is now commonplace for domestic law firms to extend their reach across international borders, engage in legal matters that span multiple jurisdictions, and collaborate with overseas colleagues and foreign counsel on a regular basis.

Features

Dark Web Marketplace Takedowns Mitigate Legal's Cyberthreat, But Only So Much Image

Dark Web Marketplace Takedowns Mitigate Legal's Cyberthreat, But Only So Much

Rhys Dipshan

The recent takedown of dark web marketplace AlphaBay represented a major success for law enforcement agencies in the U.S. and around the world. However, experts caution that its effect on mitigating the overall level of cyberthreat faced by corporations and law firms alike, while significant, will likely be temporary at best.

Features

D.C. Circuit Reverses Dismissal of Case over Cyberattack, Finding Possible Harm in Data Loss Image

D.C. Circuit Reverses Dismissal of Case over Cyberattack, Finding Possible Harm in Data Loss

Amanda Bronstad

Calling for a broader view of standing, a federal appeals court in Washington, DC, has reversed the dismissal of a case brought over the 2014 cyberattack of health insurer CareFirst.

Features

Cyber Crime Now Targeting Law Firms Image

Cyber Crime Now Targeting Law Firms

Collin Hite

Cyber attacks and theft are on the rise around the country, and law firms are becoming prime targets. Unlike manufacturers, banks and retailers, law firms are unique organizations that are highly vulnerable.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Bankruptcy Sales: Finding a Diamond In the Rough
    There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
    Read More ›
  • Restrictive Covenants Meet the Telecommunications Act of 1996
    Congress enacted the Telecommunications Act of 1996 to encourage development of telecommunications technologies, and in particular, to facilitate growth of the wireless telephone industry. The statute's provisions on pre-emption of state and local regulation have been frequently litigated. Last month, however, the Court of Appeals, in <i>Chambers v. Old Stone Hill Road Associates (see infra<i>, p. 7) faced an issue of first impression: Can neighboring landowners invoke private restrictive covenants to prevent construction of a cellular telephone tower? The court upheld the restrictive covenants, recognizing that the federal statute was designed to reduce state and local regulation of cell phone facilities, not to alter rights created by private agreement.
    Read More ›