Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

The GDPR Image

The GDPR

Ryan Costello

<b><i>Considerations for Corporate Counsel and Discovery Teams</b></i><p>With the EU's General Data Protection Regulation (GDPR) set to take effect in May 2018, the serious implications for corporate legal counsel and e-discovery teams are difficult to deny.

Features

<b><i>Online Extra</b></i><br>What Companies Can Demand From Law Firms on Data Security Image

<b><i>Online Extra</b></i><br>What Companies Can Demand From Law Firms on Data Security

C. Ryan Barber

Association of Corporate Counsel Releases First Set of Model Cybersecurity Practices

Features

Information Security: The Human Factor Image

Information Security: The Human Factor

Michael Kemps & Kimberly Pease

Law firms must be diligent about their information security — not just via protection through technology, but by training staff on what to look for and how to react to cybersecurity threats. Most security breaches arise out of human error or negligence. Educating users is one of the best defenses.

Features

<i><b>Online Extra</b></i><br> Are Law Departments Letting Law Firms Off the Hook When it Comes to Cybersecurity? Image

<i><b>Online Extra</b></i><br> Are Law Departments Letting Law Firms Off the Hook When it Comes to Cybersecurity?

Daniella Isaacson

It is time for a reality check on cybersecurity. Our research has focused on the threat that data breaches present to law firms and law departments independently, but the interplay between cybersecurity at law firms and law departments is increasingly impossible to ignore.

Features

Untangling the Mystery of Cybersecurity Insurance Image

Untangling the Mystery of Cybersecurity Insurance

Sean B. Cooney

IT security professionals used to warn that only two types of businesses exist: those that have been hacked, and those that will be. Now, many are even more pessimistic, and divide the world's businesses into companies that know that they have been hacked, and those that don't. Law firms are juicy targets with all the personal identifiable information (PII) contained in client files. Intellectual property practices are especially attractive to cyber thieves because of the value of patent, trademark and trade secret information.

Features

A Primer for the Entertainment Industry on the Use of Blockchain Technology Image

A Primer for the Entertainment Industry on the Use of Blockchain Technology

Emile Loza de Siles

This article familiarizes lawyers with cryptocurrency and, particularly, the enabling blockchain technology, methodologies and systems.

Features

Cybersecurity: Law Firms Are Coming Up Short Image

Cybersecurity: Law Firms Are Coming Up Short

Ricci Dipshan

An ALM Survey Reports Disturbing Information

Features

What You Need to Know to Get Started with Privacy Shield Certification Image

What You Need to Know to Get Started with Privacy Shield Certification

David F. Katz

If your company maintains operations in the European Union or is U.S. based but obtaining personal data from European citizens, you will need to strongly consider obtaining certification under the new Privacy Shield framework. Certification began in August 2016, and will make compliance with EU privacy laws when transferring data to the U.S. possible for the immediate future.

Features

Blockchain: A Short Primer for Lawyers Image

Blockchain: A Short Primer for Lawyers

Emile Loza de Siles

This article familiarizes lawyers with cryptocurrency and, particularly, the enabling blockchain technology, methodologies and systems. It also introduces lawyers to blockchain's current and future uses and points to other resources to learn more about this profoundly disruptive and promising collection of technological advancements.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Bankruptcy Sales: Finding a Diamond In the Rough
    There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
    Read More ›
  • Supreme Court Asked to Assess Per Se Rule Tension in Criminal Antitrust
    In recent years, practitioners have observed a tension between criminal enforcement of the broadly written terms of the Sherman Antitrust Act of 1890 and the modern Supreme Court's notions of statutory interpretation and due process in the criminal law context. A certiorari petition filed in late August in Sanchez et al. v. United States, asks the Supreme Court to address this tension, as embodied in the judge-made per se rule.
    Read More ›
  • Restrictive Covenants Meet the Telecommunications Act of 1996
    Congress enacted the Telecommunications Act of 1996 to encourage development of telecommunications technologies, and in particular, to facilitate growth of the wireless telephone industry. The statute's provisions on pre-emption of state and local regulation have been frequently litigated. Last month, however, the Court of Appeals, in <i>Chambers v. Old Stone Hill Road Associates (see infra<i>, p. 7) faced an issue of first impression: Can neighboring landowners invoke private restrictive covenants to prevent construction of a cellular telephone tower? The court upheld the restrictive covenants, recognizing that the federal statute was designed to reduce state and local regulation of cell phone facilities, not to alter rights created by private agreement.
    Read More ›