Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Data Privacy and Security Considerations for Mobile Health App Developers and Their Counsel Image

Data Privacy and Security Considerations for Mobile Health App Developers and Their Counsel

Angela Matney

In light of the evolving legal and regulatory landscape, app developers and their counsel should examine developers' privacy and security practices and take steps to safeguard sensitive data related to reproductive health.

Features

California's Latest Privacy Rulemaking Proposes Further Obligations for Businesses   Image

California's Latest Privacy Rulemaking Proposes Further Obligations for Businesses  

Kyle Fath, Alan Friel, Shea Leitch & David J. Oberly

While the the California Privacy Protection Agency kicked some of the more difficult issues down the road for further consideration, its first draft of proposed Regs is quite comprehensive with respect to the issues addressed. The authority for some of what is proposed is questionable and will likely be challenged in comments, if not judicial action, if such provisions become final.

Features

Proactively Tackling Unstructured Data Can Give Competitive Advantage Image

Proactively Tackling Unstructured Data Can Give Competitive Advantage

Rich Hale

Unstructured data comprises 80% of total data volume for legal organizations, which means that on average, only one-fifth of the entirety of the data set is properly secured and actively managed. Although some believe that ignoring unstructured data establishes plausible deniability that relinquishes them from culpability when a breach occurs, it's an untenable position from both a regulatory and brand reputational perspective.

Features

Cloud-Based Discovery Is at Critical Mass: A Practical Approach Image

Cloud-Based Discovery Is at Critical Mass: A Practical Approach

Kenneth Spencer

Part Two of a Two-Part Series Cloud technology use in discovery is inevitable. Fortunately, one of the inherent benefits of cloud discovery platforms is the ability to spin up a proof of concept matter quickly to get your feet wet. This article provides a practical approach to making sure you're ready for the cloud when the time comes.

Features

Online Accessibility and SEO Image

Online Accessibility and SEO

Sarah Brodsky

How can you make your user experience the best it can be for all potential clients, and lead with empathy and equity as you demonstrate your knowledge? That's where your law firm's SEO strategy comes into play.

Features

Traditional Legal Ops Putting Law Firms At Disadvantage When Recruiting for Cybersecurity and Privacy Image

Traditional Legal Ops Putting Law Firms At Disadvantage When Recruiting for Cybersecurity and Privacy

Bruce Love & Patrick Smith

Law firms are still insisting on engaging with clients in the traditional legal model — by hours billed. Whereas cybersecurity services such as breach monitoring have the potential for a much deeper and stickier relationship with the client.

Features

Ninth Circuit Says Copyright Plaintiffs Can Reach Back More Than Three Years In Seeking Infringement Damages Image

Ninth Circuit Says Copyright Plaintiffs Can Reach Back More Than Three Years In Seeking Infringement Damages

Stan Soocher

How far back from accrual of a claim may a plaintiff reach for copyright damages?

Features

'Banana' Artwork Dispute Presents Slippery Slope for Copyright Image

'Banana' Artwork Dispute Presents Slippery Slope for Copyright

Robert W. Clarida & Thomas Kjellberg

In July, the U.S. District Court for the Southern District of Florida denied a motion to dismiss in Morford v. Cattelan, a decision that began by posing the question: "Can a banana taped to a wall be art?"

Features

Removing Restrictive Covenants Image

Removing Restrictive Covenants

Stewart E. Sterk

In Rockwell v. Despart, the Third Department recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?

Features

Dealing With Deleted, Unsent and Edited ESI  Image

Dealing With Deleted, Unsent and Edited ESI 

Kim Beight Kelly

While text messages and email have the appearance of reliability, technological advances have, over time, rendered many digital communications less static and more open to manipulation.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Bankruptcy Sales: Finding a Diamond In the Rough
    There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
    Read More ›
  • Compliance Officers and Law Enforcement: Friends or Foes?
    <b><i>Part Two of a Two-Part Article</b></i><p>As we saw in Part One, regulators have recently shown a tendency to focus on compliance officers who they deem to have failed to ensure that the compliance and anti-money laundering (AML) programs that they oversee adequately prevented corporate wrongdoing, and there are several indications that regulators will continue to target compliance officers in 2018 in actions focused on Bank Secrecy Act/AML compliance.
    Read More ›
  • Artist Challenges Copyright Office Refusal to Register Award-Winning AI-Assisted Work
    Copyright law has long struggled to keep pace with advances in technology, and the debate around the copyrightability of AI-assisted works is no exception. At issue is the human authorship requirement: the principle that a work must have a human author to be eligible for copyright protection. While the Copyright Office has previously cited this "bedrock requirement of copyright" to reject registrations, recent decisions have focused on the role of human authorship in the context of AI.
    Read More ›