Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Columns & Departments

Landlord & Tenant Image

Landlord & Tenant

ssalkin

Loft Tenant Subject to Rent Stabilization<br>Video Surveillance a Substitute for Part-Time Lobby Attendants

Features

Cloudy With a Chance of IoT attacks: The Cybersecurity Forecast for 2019 Image

Cloudy With a Chance of IoT attacks: The Cybersecurity Forecast for 2019

Leigh-Anne Galloway

2018 was a trying year for the cybersecurity industry, with breaches increasing and showing no signs of slowing as we enter the New Year. 2019 will bring its own threats with the propagation of new technology — 5G and IoT — and their security vulnerabilities. However, there's also progress on the horizon, thanks to more stringent government regulation and increasing legal action.

Features

What the U.S.' Pursuit of Foreign Nation-State Hackers Means for Cybercrime Victims and Targets Image

What the U.S.' Pursuit of Foreign Nation-State Hackers Means for Cybercrime Victims and Targets

Ronald Cheng & Mallory Jensen

For years, the U.S. has maintained an active enforcement campaign against overseas cyber criminals and while these past efforts have not been haphazard, they have not necessarily been part of a specific drive to address the serious issue of foreign cybercrime committed by nation states. Recent announcements by the DOJ show that this enforcement campaign is accelerating and expanding.

Features

Q&A with Women Leaders in Cybersecurity and Privacy Image

Q&A with Women Leaders in Cybersecurity and Privacy

Adam Schlagman

In 2017, Atlanta attorney Bess Hinson founded the Atlanta Women in Cybersecurity Roundtable, an invitation-only initiative to provide community and resources to advance women in cybersecurity in Atlanta. Here, we speak with some of those women leaders about their biggest security and privacy challenges and why women are pursing legal and other roles in the cybersecurity and privacy field.

Features

Are Cybersecurity Solutions and Consulting a New Revenue Stream for Law Firms? Image

Are Cybersecurity Solutions and Consulting a New Revenue Stream for Law Firms?

Ishan Girdhar

The Big 4 accounting firms have identified legal services as an area for growth beyond traditional financial services and consulting services.

Features

Detecting, Discovering, and Eliminating Threats Image

Detecting, Discovering, and Eliminating Threats

Tyler Young

Defending your corporation from advanced cyber threats is a difficult and never-ending challenge. The attack surface of an organization is constantly adapting to meet the needs of a business and attack vectors are increasing nearly every few hours.

Features

Fighting Biometric Fraud on the Blockchain Image

Fighting Biometric Fraud on the Blockchain

Alastair Johnson

The use of SMS verification codes as a security measure has recently been exposed as a mere stop-gap solution because of the ability of hackers to fraudulently take over phone numbers. Biometrics meanwhile is proving to be one of the best new technologies to combat fraud and identity theft.

Features

The Confounding Paradox of Marketing Investment for Struggling Law Firms Image

The Confounding Paradox of Marketing Investment for Struggling Law Firms

Bill Josten

"You have to spend money to make money." Or, so holds the well-worn cliché. For those firms struggling to find meaningful growth in today's market, where do they find the funds they need to spend in order to spur growth?

Features

Professional Development: 10 Performance Tips for Your Presentation Image

Professional Development: 10 Performance Tips for Your Presentation

Sharon Abrahams

Finally, it has happened. You have reached the stage in your career that others want to hear from you and learn what you know in your area of expertise. You have been invited to speak at a conference. What now?

Features

Federal Data Privacy Legislation Is Likely Next Year, Tech Lawyers Say Image

Federal Data Privacy Legislation Is Likely Next Year, Tech Lawyers Say

Dan Clark

For Years, Federal Legislators Have Attempted to Pass Comprehensive Cybersecurity and Data Privacy Legislation. With More Support Than Ever from the Public, Industry and Both Sides of the Political Spectrum, 2019 May Be the Year When Such Legislation Is Enacted.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The 'Sophisticated Insured' Defense
    A majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.
    Read More ›
  • Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric Code
    In an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.
    Read More ›