Features
7 Recommendations for Social Media Influencers and Companies to Protect Themselves Against Copyright Issues
By understanding some of the risks posed by copyright law and by following the above recommendations, influencers and brands can protect their creative works and reputations and build a mutually beneficial partnership.
Features
Compliance Requirements of CISA's Proposed Cyber Incident Reporting Rule
This article focuses on the requirements of CISA's proposed cyber incident reporting rule, the compliance requirements for covered entities and the steps entities can take to protect themselves.
Features
Protecting Privacy and Sensitive Data In Era of Neurotechnologies
Scientists have been collecting neural data from the brain for medical reasons for years, with myriad regulatory constraints in place. But in 2024, technologies are moving fast and furiously into the realm of consumer products.
Features
Gen-AI Created Influencers Bring New Risks
A steep rise in the use of GenAI and computer-generated influencers brings with it new marketing risks and considerations for celebrities, influencers and businesses alike.
Features
Big Law Looks To Influence Vendor-Developed AI
In the AI edition of the classic "build versus buy" dilemma, some marquee firms have opted to leverage their position as the largest buyers of legal tech to influence vendor development of AI-powered services to suit their needs.
Features
China Finalizes New Regulations to Relax Personal Data Exports from China
Nearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.
Features
The Perfect Storm: Why Contract Hiring In Privacy Will Eclipse Direct Hiring In 2024
With significantly fewer fully remote positions available in 2023, active job seekers were faced with the question of whether to begin considering compromises on work-from-home flexibility or compromise in other areas like compensation, vertical mobility, quality of life, or employment modality.
Features
Lessons for CISOs from the SolarWinds Breach and SEC Enforcement
In an era where digital threats loom large, the responsibilities of Chief Information Security Officers have expanded beyond traditional IT security to encompass a broader governance, risk management, and compliance role. The infamous SolarWinds Corp. attack illustrates the complex cybersecurity landscape CISOs navigate.
Features
Shielding Law Practices: Mitigating Vendor Risks to Safeguard Client Confidentiality
Because vendors often access clients' internal systems, customer data, and intellectual property, they will always be a magnet for hackers searching for valuable data. Bad actors will always look for the weak spots in a firm's defenses, including those deployed by a firm's vendors and other third parties. And signs point to a growing number of cyberattacks, not a lessening of them.
Features
A Roadmap for Implementing Information Governance In Law Firms
In today's digital age, the volume of data generated and managed by law firms has skyrocketed, presenting both opportunities and challenges. Unfortunately, in parallel with this exponential growth in data, and partially as a direct result of it, law firms have also experienced a significant increase in targeted cyberattacks.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The FTC Gets Into the College Athlete NIL GameAs national champions are crowned in men's and women's basketball, hundreds of thousands of college athletes are entering the influencer marketplace for the first time and now find themselves attractive candidates in the fast growing influencer marketing arena. With influencer marketing potentially providing a 5x return on investment, many brands are eager to get into the industry, but it doesn't come without risks as the FTC Commissioner is taking a closer look at the use of influencers for marketing.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- The Roadmap of Litigation AnalyticsLitigation analytics can be considered a roadmap of sorts — an important guide to ensure the legal professional arrives at the correct litigation strategy or business plan. However, like roadmaps, litigation analytics will only be useful if it's based on data that is complete and accurate.Read More ›
