Features

Protecting Privacy and Sensitive Data In Era of Neurotechnologies
Scientists have been collecting neural data from the brain for medical reasons for years, with myriad regulatory constraints in place. But in 2024, technologies are moving fast and furiously into the realm of consumer products.
Features

Gen-AI Created Influencers Bring New Risks
A steep rise in the use of GenAI and computer-generated influencers brings with it new marketing risks and considerations for celebrities, influencers and businesses alike.
Features

Big Law Looks To Influence Vendor-Developed AI
In the AI edition of the classic "build versus buy" dilemma, some marquee firms have opted to leverage their position as the largest buyers of legal tech to influence vendor development of AI-powered services to suit their needs.
Features

China Finalizes New Regulations to Relax Personal Data Exports from China
Nearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.
Features

The Perfect Storm: Why Contract Hiring In Privacy Will Eclipse Direct Hiring In 2024
With significantly fewer fully remote positions available in 2023, active job seekers were faced with the question of whether to begin considering compromises on work-from-home flexibility or compromise in other areas like compensation, vertical mobility, quality of life, or employment modality.
Features

Lessons for CISOs from the SolarWinds Breach and SEC Enforcement
In an era where digital threats loom large, the responsibilities of Chief Information Security Officers have expanded beyond traditional IT security to encompass a broader governance, risk management, and compliance role. The infamous SolarWinds Corp. attack illustrates the complex cybersecurity landscape CISOs navigate.
Features

Shielding Law Practices: Mitigating Vendor Risks to Safeguard Client Confidentiality
Because vendors often access clients' internal systems, customer data, and intellectual property, they will always be a magnet for hackers searching for valuable data. Bad actors will always look for the weak spots in a firm's defenses, including those deployed by a firm's vendors and other third parties. And signs point to a growing number of cyberattacks, not a lessening of them.
Features

A Roadmap for Implementing Information Governance In Law Firms
In today's digital age, the volume of data generated and managed by law firms has skyrocketed, presenting both opportunities and challenges. Unfortunately, in parallel with this exponential growth in data, and partially as a direct result of it, law firms have also experienced a significant increase in targeted cyberattacks.
Features

Navigating Custody and Control: Ownership of Smartphone Data and Enforcement of Usage Policies
New regulations from the DOJ around the ownership and governance of company data on personal devices are catching up to the way the world actually works. It's going to make companies' lives a lot harder — and for precisely the same reason that smartphones have made their lives a lot easier.
Features

Is Genetic Information the Next Privacy Battleground?
GIPA litigation remains in its early stages, but the possibility of exorbitant statutory damages could make GIPA the next major trend in privacy class action litigation.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- CLE Shouldn't Be the Only Mandatory Training for AttorneysEach stage of an attorney's career offers opportunities for a curriculum that addresses both the individual's and the firm's need to drive success.Read More ›
- Discovery of Claim Construction and Infringement Analysis May be Compelled Prior to a Markman HearingA defendant in a patent infringement suit may, during discovery and prior to a <i>Markman</i> hearing, compel the plaintiff to produce claim charts, claim constructions, and element-by-element infringement analyses.Read More ›
- AI's Growing Impact On the Gaming IndustryThe gaming and wagering sector has begun to cross paths with artificial intelligence technology in ways both predictable and unforeseen. As with other industries, AI technology inevitably has found its way into various components of the gaming experience. What is striking, however, is how AI is revolutionizing gaming for operators, regulators, suppliers and patrons alike.Read More ›
- DOJ and States Open Antitrust Case Against Google for Monopolizing Internet Search MarketThe U.S. Department of Justice and dozens of states opened their antitrust case against Google in Washington last month, accusing the tech giant of illegally monopolizing the internet search and related ad markets.Read More ›
- <b><i>Online Extra</b></i><br> Law Firms, Legal Departments Predicted to Focus More on IT RiskOverall global spending in the information security services and products sector will total $86.4 billion this year, an increase of 7% over last year.Read More ›