Features

Denmark Deepfake Strategy Anchored In Copyright, Not Privacy
Denmark aims to make EU history by using copyright law — not privacy rules — to crack down on deepfakes and protect personal likenesses, diverging from the approaches adopted in the U.S. and other nations.
Features

Improving Your Cybersecurity Today: 10 Tips to Take Your Firm’s Security from Good to Great
This two-part series summarizes modern security practices as advised by NIST’s latest guidelines, a framework that prioritizes proactive, resilient and user-friendly strategies. Part One of the series, published in last month’s issue, offered 10 must-know tips to improve personal cybersecurity; Part Two shares 10 tips to take your firm or organization’s security from good to great.
Features

DOJ Regulation to Protect Americans’ Personal Data Takes Effect
In a show of continuity between administrations, the Biden-era Executive Order 14117 — designed to restrict foreign access to Americans’ most sensitive personal data — has been allowed to take effect in the second Trump administration.The Department of Justice’s implementing regulation for this Order, finalized in late December 2024, became enforceable in April 2025.
Features

A Critical Leap Forward: How AI and Open-Source Intelligence Are Redefining Risk in Legal Operations
In today’s digital-first business environment, legal departments are confronting an unprecedented escalation of risk. Cyberattacks are growing more frequent and sophisticated. Regulatory complexity is expanding across jurisdictions. And the pressure to respond quickly — without compromising accuracy or trust — is mounting.
Features

Know Your Data: Why AI-Driven Information Governance Is Essential
The wave of cyberattacks and data breaches has turned information governance from a compliance afterthought into a required business function. Yet, despite well-publicized threats and skyrocketing costs associated with cyber incidents, most companies remain both underinsured and fundamentally underprepared.
Features

Improving Your Cybersecurity Today: 10 Must-Know Tips to Reduce Personal Risk
In the modern digital landscape, both personal and organizational cybersecurity are more critical than ever. This two-part series summarizes modern security practices as advised by the National Institute of Standards and Technology’s latest guidelines, a framework that prioritizes proactive, resilient and user-friendly strategies. Part one of the series offers 10 must-know tips for personal cybersecurity. Part Two will share 10 tips to take your firm/organization’s security from good to great.
Features

Back to the Future: How Data Privacy Laws Can Teach Us What to Expect With AI Regulation
While the amount of AI legislation introduced in various states is relatively limited, the scope of issues being legislated is quite broad. Despite the many uncertainties that remain to be clarified, there are actually many parallels between how data privacy laws took shape five years ago, and how AI legislation is developing today.
Features

Spurred By Data Breaches, CLOs Are Increasing Cybersecurity Leadership Role
Chief information officers still bear the brunt of cybersecurity worries at many companies. But a study by the Association of Corporate Counsel Foundation finds that chief legal officers are increasingly taking a leadership role in cybersecurity strategy.
Features

Shifting Crypto and Cyber Priorities In SEC Enforcement
When the SEC issues the next annual enforcement report for fiscal year 2025, we expect securities offering actions and investment adviser actions will almost certainly be up, and the “crypto” and “cyber” cases will almost certainly be down. Public statements by the new SEC administration have said as much, but even more telling than public statements are the allocation of limited enforcement resources.
Features

Recognizing and Combatting Online ‘Dark Patterns’
As online platforms become more sophisticated, so do the tactics designed to manipulate user behavior. Among these, “dark patterns” have emerged as a particularly concerning phenomenon. This article explores the different types of dark patterns prevalent online, examines how they affect consumers and businesses, and analyzes the legal frameworks emerging to combat these practices in Connecticut the EU.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- The Federal Circuit Clarifies Who Can Be an Expert In Patent CasesIn September 2024, the Federal Circuit clarified the necessary qualifications for a technical expert to testify in a patent lawsuit, holding that while an expert must possess ordinary skill in the art, they need not have possessed such skill "at the time of the alleged invention."Read More ›
- FIFA Decision Curtail U.S. Efforts to Police Foreign Commercial BriberyHeeding the U.S. Supreme Court's clear message that ever-expanding constructions of the general fraud statutes are out of style, the latest decision out of the U.S. District Court for the Eastern District of New York in the long-running FIFA saga has the potential to substantially curtail U.S. efforts to police foreign commercial bribery.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›