Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Cybersecurity Roundtable: Chicago's Tech Experts Answer Three Critical Cybersecurity Questions Image

Cybersecurity Roundtable: Chicago's Tech Experts Answer Three Critical Cybersecurity Questions

Adam Schlagman

Earlier this summer a group of security-minded executives in Chicago, long a hub for legal and financial tech, sat down for a panel discussion on anticipating and combatting cybercrime.

Features

Law Firms: You Can't Buy Yourself Out Of Risk Image

Law Firms: You Can't Buy Yourself Out Of Risk

Mark Sangster

A survey of more than 160 law firm executives (from medium to large firms) found that law firms are among some of the highest spenders on security yet were susceptible to some of the most common risks. And the issue will grow over the coming years as the demands of the business drive the adoption of emerging technologies, such as cloud and Artificial Intelligence (AI).

Features

Securing Each Link in the e-Discovery Chain Image

Securing Each Link in the e-Discovery Chain

David A. Greetham

Cloud service providers to the federal government must meet the rigorous requirements of the Federal Risk and Authorization Management Program. FedRAMP, as it's known, is designed to help federal agencies follow the government's “cloud first” policy, and includes detailed and strict encryption and other cybersecurity requirements.

Features

Blockchain Will Bring Opportunities, Challenges to Legal Discovery Image

Blockchain Will Bring Opportunities, Challenges to Legal Discovery

Adam Brill

As more and more data is in blockchains, attorneys will have to interact with it. Blockchain will also become part of litigation without being the central focus as systems move to blockchain implementation. Attorneys will have to take note.

Features

Legal Tech: Early 2018 E-Discovery Case Law Review: Sanctions and the Reasonableness of TAR Image

Legal Tech: Early 2018 E-Discovery Case Law Review: Sanctions and the Reasonableness of TAR

Mike Hamilton

Cases from early 2018 that stand above many others for the impact they will have on both sanctions and e-discovery review processes moving forward.

Features

What We Learned from ILTACON'18 Image

What We Learned from ILTACON'18

Rhys Dipshan

A wrap-up of the 2018 ILTACON.

Features

Get Ready for California's Version of the EU General Data Protection Regulation Image

Get Ready for California's Version of the EU General Data Protection Regulation

Jacqueline Klosek

The entertainment industry is intensely focused on data collection and analytics as it seeks to maximize the exploitation of digital content. Just as those of us in the privacy field had begun to have a slight breather as much of the heavy lifting on the GDPR was finally behind us, lawmakers in California have passed the California Consumer Privacy Act of 2018 (CCPA).

Features

General Data Protection Regulation: Defense or Offense? Image

General Data Protection Regulation: Defense or Offense?

Nina Cunningham

Ostensibly, GDPR's mission is to strengthen and unify the EU's protection of online privacy rights and promote data protection for citizens of the 28 countries currently in the EU. In the global economy, however, GDPR serves as an alarm to all countries with business flowing across Europe and well beyond. Where business flows, data follow.

Features

Measuring Success in Cybersecurity Image

Measuring Success in Cybersecurity

Chris Moschovitis

Cybersecurity concerns are akin to health concerns. You can practice a healthy lifestyle; you can get regular medical check-ups; you can be vigilant in monitoring your own body. Still, the question remains, “How do I know I'm healthy?” The answer is, “You don't.”

Features

Five Takeaways from Recent Cybersecurity Developments by Colorado and the SEC Image

Five Takeaways from Recent Cybersecurity Developments by Colorado and the SEC

Brian Neil Hoffman

Colorado recently adopted a new law expanding companies' obligations in the event of a cybersecurity incident, and establishing new data security and disposal obligations. Recent announcements by the SEC likewise emphasize important responsive points for both companies and their personnel in the wake of an incident. Five key takeaways from these developments are highlighted in this article.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • "Holy Fair Use, Batman": Copyright, Fair Use and the Dark Knight
    The copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›