Features

What Employers Need to Know About Employee Privacy
Many employers struggle with not only identifying what is private protectable information, but also how to safeguard that information while also protecting the company's own business interests. Given the increased costs of litigation, it is critical that employers understand their obligations under the law and how to strike a legally compliant balance between these competing interests.
Features

Law Firms' Pressing AI Questions
Most of the legal industry has by now boarded the generative artificial intelligence train, filling up conference sessions dedicated to the topic, testing new legal technology solutions and exploring the emerging legal questions that the technology will pose. But most of their questions about generative AI are still unanswered.
Features

U.S. Regulators Lift the Curtain on Data Practices with Assessment, Reporting and Audit Requirements
The assessment and audit requirements of the new generation of state data protection laws will force U.S. companies to move beyond mere window dressing and instead require them to develop fulsome data protection programs.
Features

Artificial Intelligence Redefines Our Defense Against Cyber Threats
The cybersecurity landscape is on the brink of a transformative shift, with predictive analytics and behavioral analysis leading the charge for more resilient and adaptive defenses.
Features

Deep Fake of CFO on Videocall Used to Defraud Company of $25M
Hackers are using AI to sift large digital data to identify more convincing approaches for their scams as well as weaknesses in weaknesses in software coding or network security.
Features

5 Expert Cybersecurity Steps to Take in 2024
As many CISOs and cyber teams think about the year ahead, and legal professionals consider the far-reaching consequences of cybersecurity, here is a checklist to help them prepare for the biggest cybersecurity trends to come.
Features

Pennsylvania Court Hit With Cyberattack, But It Had a Plan
Law firms have information that hackers want — Social Security numbers, financial data, personally identifiable information and more. It is therefore essential that firms plan for a possible breach. And when the breach occurs, have a plan.
Features

FTC's 'Click to Cancel' Rule Could Cost $2.7 Billion for Businesses
The FTC's proposed click to cancel rule amendments would impose a one-time cost of $2.7 billion on businesses and have an annual effect on the national economy of at least $100 million, according to an economic report by the online advertising industry's association.
Features

All the News That's Fit to Pinch: 'NYT v. OpenAI'
The emerging cases by authors and copyright owners challenging various generative AI programs for using copyrighted materials are certain to create new troubles for the courts being asked to apply the fair use doctrine to this important new technology.
Features

To Benefit from Cyber Insurance Coverage in France, Don't Forget to File a Complaint
Since April 2023, French regulation makes the payment of insurance compensation in case of cyberattacks conditional on the filing of a complaint within a reduced time frame. This regulation has been enacted in the context of the French government decision to fight against the resurgence of cyberattacks, together with ransom demands, which have a significant impact on the economy.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- The Anti-Assignment Override ProvisionsUCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›