Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

What You Need to Know to Get Started with Privacy Shield Certification Image

What You Need to Know to Get Started with Privacy Shield Certification

David F. Katz

If your company maintains operations in the European Union or is U.S. based but obtaining personal data from European citizens, you will need to strongly consider obtaining certification under the new Privacy Shield framework. Certification began in August 2016, and will make compliance with EU privacy laws when transferring data to the U.S. possible for the immediate future.

Features

Blockchain: A Short Primer for Lawyers Image

Blockchain: A Short Primer for Lawyers

Emile Loza de Siles

This article familiarizes lawyers with cryptocurrency and, particularly, the enabling blockchain technology, methodologies and systems. It also introduces lawyers to blockchain's current and future uses and points to other resources to learn more about this profoundly disruptive and promising collection of technological advancements.

Features

New York State's Financial Services Cybersecurity Regulation Image

New York State's Financial Services Cybersecurity Regulation

Elizabeth B. Vandesteeg & Kathryn C. Nadro

The Regulation was designed to promote the protection of customer information as well as the underlying information technology systems of regulated entities in light of the ever-increasing threat of cyber attacks.

Features

Is Your Law Firm Running 'Encryption Light?' Image

Is Your Law Firm Running 'Encryption Light?'

Nina Cunningham

With so many warnings to lawyers about transmitting unsecured email and attachments, it can be difficult to understand the solutions available and how they differ. Some may improve security but make communications cumbersome. If too cumbersome, users seek a way to work around them or choose less powerful tools.

Features

Cyber Spies: In-House Legal Fights Back Against Cyberespionage Image

Cyber Spies: In-House Legal Fights Back Against Cyberespionage

Ricci Dipshan

<b><i>An Exploration of the Modern Cyberespionage Threat and How In-House Legal Departments Are Fighting Back</b></i><p>Though faced with limited legal remedies, counsel are coming up with creative new ways to go after cyberespionage actors, and partnering with an array of cyber professionals and government agencies to combat the threat.

Features

The 'Soft Underbelly' of Cybersecurity Meets Legal Ethics Image

The 'Soft Underbelly' of Cybersecurity Meets Legal Ethics

Jerry Cohen

Legal departments for business organizations rate cybersecurity, regulation and ethics compliance among their chief concerns, and they are well aware of surveys showing law firms to be the "soft underbelly" of business security due to weakness of their cybersecurity.

Features

Data Breaches by Employees<br><b><i><font="-1">How to Keep Your Company Out of the Headlines</b></i></font> Image

Data Breaches by Employees<br><b><i><font="-1">How to Keep Your Company Out of the Headlines</b></i></font>

Sam Chi

The more we understand about how data breach incidents originate and propagate, the more likely we are to shift focus from outsider hackers to insider (employee) threats. Insider threats can be malicious, but often they are accidental.

Features

<b><i>Online Extra</b></i><br>Are You Ready for the New China Cybersecurity Law? Image

<b><i>Online Extra</b></i><br>Are You Ready for the New China Cybersecurity Law?

Zach Warren

<b><i>A Consilio Survey Found 75% of Legal Tech Professionals Are Unfamiliar with the Law, But Multinational Companies Can Still Prepare Before the June Implementation</b></i><p>In December 2016, China passed a comprehensive Cybersecurity Law, expanding the country's data localization requirement once it goes into effect this June and sparking heated debate among Chinese lawmakers. Some experts say even more legislation could be on the way.

Features

Client Data in the Age of Digital Technologies and Cyber Warfare Image

Client Data in the Age of Digital Technologies and Cyber Warfare

Tinamarie Feil

Ubiquitous news of law firm data breaches, even among BigLaw, spotlights a treasure trove of trade secrets, confidential and strategic transactions, and sensitive client information. No wonder law firms are perceived to be attractive targets of cyber-attacks. Attractive? You can't help that. Easy? Not so fast.

Features

<i>BREAKING NEWS</i><br>Yahoo General Counsel Ron Bell Resigns Amid Data Breach Controversy Image

<i>BREAKING NEWS</i><br>Yahoo General Counsel Ron Bell Resigns Amid Data Breach Controversy

Jennifer Williams-Alvarez

Yahoo Inc. announced on March 1 that general counsel Ron Bell is leaving the tech giant after an investigation of the company revealed that its legal team failed to sufficiently inquire into a massive 2014 cybersecurity breach.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategic Uses of a Rule 2004 Exam
    While most bankruptcy practitioners are familiar with the basic concepts behind the Rule 2004 exam, some are less familiar with the procedural intricacies of obtaining, conducting, and responding to the exam ' intricacies that often involve practices and procedures adapted from civil discovery that are beyond the scope of pure bankruptcy practice. This article explains.
    Read More ›