Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

WannaCry Attack Is A Wake-Up Call for Cyber Preparedness Image

WannaCry Attack Is A Wake-Up Call for Cyber Preparedness

India E. Vincent

The scope of WannaCry changed our perceptions of ransomware attacks. It made it clear that ransomware could reach a broad cross-section of computers worldwide, at essentially the same time.

Features

Asserting Damages for Data Piracy Under the CFAA Image

Asserting Damages for Data Piracy Under the CFAA

Shari Claire Lewis

When a database is breached in one way or another, the results can be devastating. Many companies suffering this kind of loss turn to litigation, often under the Computer Fraud and Abuse Act, which prohibits improperly accessing a protected computer. There is, however, a growing consensus in the Second Circuit that recovery of certain forms of damages under the CFAA simply is not permitted.

Features

3 Steps to Ensuring Your AI Initiative Does Not Fail Image

3 Steps to Ensuring Your AI Initiative Does Not Fail

Bobbi Basile

The energy in the legal industry surrounding artificial intelligence (AI) is undeniable. Law firms are investing in innovation or undertaking experiments to test the viability of applying AI-enabled tools to various disciplines. Legal professionals are packing presentations to learn if, how and when the heralded disruption will impact their careers.

Features

GDPR Gets Real Image

GDPR Gets Real

Jason Straight

A procrastinator's guide to overcoming technical challenges in GDPR compliance.

Features

Ransomware in Review: 8 Prevention and Response Tips for Your Organization Image

Ransomware in Review: 8 Prevention and Response Tips for Your Organization

Ian Lopez

Electronic data is defining the business world, and with its benefits come many threats. Here's how experts think organizations should protect against ransomware.

Features

<i><b>Legal Tech</b></i><br> Five Ways Legal and Compliance Teams Can Benefit from Office 365 Migration Image

<i><b>Legal Tech</b></i><br> Five Ways Legal and Compliance Teams Can Benefit from Office 365 Migration

Jake Frazier & Chris Zohlen

Legal and compliance groups have a lot to gain from features within Office 365, and equal or greater risk if the process is not conducted in the context of strong legal and regulatory guidelines.

Features

<i><b>BREAKING NEWS</i></b><br>DLA Piper Hit by Cyber Attack, Phones and Computers Down Across the Firm Image

<i><b>BREAKING NEWS</i></b><br>DLA Piper Hit by Cyber Attack, Phones and Computers Down Across the Firm

James Booth

The shutdown appears to have been caused by a ransomware attack, similar to the WannaCry attack that hit organizations such as the NHS last month.

Features

<i><b>BREAKING NEWS</i></b><br>DLA Piper Hit by Cyber Attack, Phones and Computers Down Across the Firm Image

<i><b>BREAKING NEWS</i></b><br>DLA Piper Hit by Cyber Attack, Phones and Computers Down Across the Firm

James Booth

The shutdown appears to have been caused by a ransomware attack, similar to the WannaCry attack that hit organizations such as the NHS last month.

Features

<b><i>BREAKING NEWS</b></i><br>Anthem Agrees to Record $115M Data Breach Settlement Image

<b><i>BREAKING NEWS</b></i><br>Anthem Agrees to Record $115M Data Breach Settlement

Ross Todd

Anthem Inc. has agreed to pay $115 million to settle claims related to the massive 2015 cyberattack that affected 78.8 million customers. If approved by U.S. District Judge Lucy Koh of the Northern District of California, the deal would be the largest data breach settlement in history.

Features

Layered Federal and State Cybersecurity Regulation of Financial Services Firms Image

Layered Federal and State Cybersecurity Regulation of Financial Services Firms

Brian Neil Hoffman, Romaine Marshall & Matt Sorensen

Cybercrime poses an ever-increasing threat to consumers of financial products and services. In 2016, the then- SEC Chair said that cybercrime ranks as “one of the greatest risks facing the financial services industry.” Federal law thus requires financial services firms to implement procedures designed to protect their customers' data. Now individual states are increasingly getting into the game.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Bankruptcy Sales: Finding a Diamond In the Rough
    There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
    Read More ›
  • Supreme Court Asked to Assess Per Se Rule Tension in Criminal Antitrust
    In recent years, practitioners have observed a tension between criminal enforcement of the broadly written terms of the Sherman Antitrust Act of 1890 and the modern Supreme Court's notions of statutory interpretation and due process in the criminal law context. A certiorari petition filed in late August in Sanchez et al. v. United States, asks the Supreme Court to address this tension, as embodied in the judge-made per se rule.
    Read More ›
  • Restrictive Covenants Meet the Telecommunications Act of 1996
    Congress enacted the Telecommunications Act of 1996 to encourage development of telecommunications technologies, and in particular, to facilitate growth of the wireless telephone industry. The statute's provisions on pre-emption of state and local regulation have been frequently litigated. Last month, however, the Court of Appeals, in <i>Chambers v. Old Stone Hill Road Associates (see infra<i>, p. 7) faced an issue of first impression: Can neighboring landowners invoke private restrictive covenants to prevent construction of a cellular telephone tower? The court upheld the restrictive covenants, recognizing that the federal statute was designed to reduce state and local regulation of cell phone facilities, not to alter rights created by private agreement.
    Read More ›