Features
How Analytics Is Shaping the Current and Future Practice of Law
Anyone following the news headlines of late is aware that artificial intelligence (AI) is being heralded as the technology that will transform industries far and wide — including the legal profession. The evolution of technology in the practice of law today has already led to significant advances in data analytics and data visualization, each of which are having a significant impact on legal work.
Features
New Research: Employee Privacy and Corporate Legal Risk
The use of business email accounts and digital devices for personal communications can be risky for both employers and employees. However, employees of all levels may be commingling corporate communications with their personal information, according to new research.
Features
<b><i>Online Extra</b></i><br>The WannaCry Attack: A Wake-up Call for Organizational Information Governance?
The sort of ransomware attack experts have warned about for years has happened. Now organizations need to examine their security postures.
Features
Federal and State Cybersecurity Regulation of Financial Services Firms
Two states recently enacted or proposed rules for financial services firms. This may be just the beginning of a national trend toward increased state regulation of cybersecurity matters. Financial services firms and their management should be prepared to proactively address the shifting regulatory landscape as it continues to evolve.
Features
<i><b>Online Extra:</b></i><br>Target to Pay $18.5M to States over Data Breach
Retail giant Target has agreed to pay a total of $18.5 million in a settlement with 47 states over a 2013 consumer data breach that resulted in over 100 million pieces of credit card or personal information being stolen by hackers.
Features
The State of Data Breach Litigation and How to Avoid It
The number of records compromised in data breaches in 2016 increased an astounding 86% over 2015 breaches. This has led to numerous data breach litigations in the civil and regulatory context. What are the major cases and trends from 2016? And what can organizations do to try to reduce their risks of breaches and litigations?
Features
State of the Industry: E-Discovery and Cybersecurity
<b><i>Part Two of a Three-Part Article</b></i><p>Examining the current similarities between e-discovery and cybersecurity and details how the history of e-discovery mirrors the present of cybersecurity and is a predictor of future patterns in the cybersecurity staffing market.
Features
Using Computer Forensics to Investigate Employee Data Theft
Departing employees have a sense of ownership over the data that they copy. Intellectual property commonly stolen includes customer lists, secret formulas, source code, strategy documents and other trade secrets. The information is often used against the organization when the former employee goes to work for a competitor or decides to start a new company.
Features
The Challenge of Complying with China's New Cybersecurity Law
In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. The law is set to go into effect June 1, 2017. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.
Features
The Challenge of Complying with China's New Cybersecurity Law
In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. The law is set to go into effect June 1, 2017. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The FTC Gets Into the College Athlete NIL GameAs national champions are crowned in men's and women's basketball, hundreds of thousands of college athletes are entering the influencer marketplace for the first time and now find themselves attractive candidates in the fast growing influencer marketing arena. With influencer marketing potentially providing a 5x return on investment, many brands are eager to get into the industry, but it doesn't come without risks as the FTC Commissioner is taking a closer look at the use of influencers for marketing.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- The Roadmap of Litigation AnalyticsLitigation analytics can be considered a roadmap of sorts — an important guide to ensure the legal professional arrives at the correct litigation strategy or business plan. However, like roadmaps, litigation analytics will only be useful if it's based on data that is complete and accurate.Read More ›
