Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

How Will NCAA's New Policy on Endorsements By Athletes Play Out Image

How Will NCAA's New Policy on Endorsements By Athletes Play Out

Sue Reisinger

University general counsel and sports lawyers across the country have been trying to figure out their next steps in the controversial world of marketing student athletes.

Features

Trial to Start in Suit over Walking Dead Stuntman Death Image

Trial to Start in Suit over Walking Dead Stuntman Death

Katheryn Hayes Tucker

The trial over a death on the set of the Walking Dead zombie drama will hinge on one key question: What happened in the moments before a stuntman plunged off a balcony and missed an airbag 20 feet below.

Features

Filers Beware: No Expedited Discovery in Copyright Suits Image

Filers Beware: No Expedited Discovery in Copyright Suits

Charles Toutant

Litigation tactics employed by frequent filers of copyright infringement suits may face heavy criticism in light of a recent ruling by a federal judge in New Jersey.

Columns & Departments

Bit Parts Image

Bit Parts

Stan Soocher

Alleged Verbal Agreement For Promotion of Concerts Found Unenforceable "Chapel of Love" Singer's Niece Fails to Show Court in Royalties Dispute Had Personal Jurisdiction over Defendant Fair Use Defense Can Be Raised Under California's Sound Recording Misappropriation Statute

Features

Effectively Managing Increasing Client Security Requirements Image

Effectively Managing Increasing Client Security Requirements

Christopher Perrotta

Gone are the days of naively assuming our confidential data is secure. Increasingly, clients, stakeholders, regulators and others are demanding proof that firms are actively protecting the PII to which they have access, and this evidence is being demanded both before and after security incidents. It is imperative law firms have the positions and processes in place to handle security incidents with urgency, accuracy and completeness.

Features

Law Firms Enter the Golden Age of Data Mining Image

Law Firms Enter the Golden Age of Data Mining

Doug Stansfield

As a matter of practice, law firms generate and store incomprehensible amounts of data. Most, if not all, of that data has been digitized and many firms that recognize the untapped value of their data have begun to leverage sophisticated technologies to mine it for reusable work product and valuable insights.

Features

Can Artificial Intelligence Fix Security Issues? Image

Can Artificial Intelligence Fix Security Issues?

Nina Cunningham

There is great enthusiasm about what AI can do to promote better living conditions, evoking wisdom, providing business intelligence through deep analysis of behavior and habits, by signaling trends and anticipating demand. But there are other considerations as well. A critical one is cybersecurity.

Features

How the Healthcare Industry Can Fight Rising Cyber-Attacks Image

How the Healthcare Industry Can Fight Rising Cyber-Attacks

Jason G. Weiss

The healthcare industry is facing an alarming proliferation of cyber perils. Why? Because our healthcare system is a "soft target," and particularly vulnerable because of its lifesaving work, where time is of the essence. It's a recipe for disaster from a cybersecurity standpoint.

Features

Cybersecurity Experts Needed in U.S. Image

Cybersecurity Experts Needed in U.S.

Scott R. Malyk & Lin R. Walker

The Country Is In Dire Need of Experts Who Possess the Advanced Knowledge, Skills and Experience Required to Combat Cybersecurity Crimes In an effort to protect our financial, personal, medical, and otherwise confidential data, as well as our election systems, we need to continue to attract and employ the services of the most qualified cybersecurity experts from around the world. However, at present, there is a dire shortage of such qualified experts in the United States.

Features

Unique Cyber Risks Faced By the Cannabis Industry Image

Unique Cyber Risks Faced By the Cannabis Industry

Victoria Hudgins

All companies face cybersecurity threats, but the legalized cannabis industry's storage of personally identifiable information and reliance on seed-to-sale tracking software can place it firmly within hackers' crosshairs.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES