Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Active Listening Wins Clients Image

Active Listening Wins Clients

Kimberly Rice

All too often, we read studies, which report clients' pet peeve with their services providers whom do not listening to them. Or, cited another way, clients…

Columns & Departments

Development Image

Development

ssalkin

Changes in Regulatory Landscape Justify Rescission of Negative Declaration<br>Definition of Family Not Unconstitutionally Vague

Features

Elections: The Hidden Security Danger for Governments Image

Elections: The Hidden Security Danger for Governments

Roy E. Hadley, Jr.

The news is replete with alleged actions of foreign governments and hackers trying to impact the democratic election process in the United States. It is incumbent upon the state and local governments to ensure the security of all elections.

Features

Why Do Cybersecurity Programs Fail? Image

Why Do Cybersecurity Programs Fail?

Chris Moschovitis

It seems this should be a key question for everyone in business, government, technology, and cybersecurity: If we know the problem with cybersecurity, and have ways of methods of addressing the problem, why are we still failing?

Features

Cybersecurity Ranks Among Top Concerns of Corporate Legal Departments Image

Cybersecurity Ranks Among Top Concerns of Corporate Legal Departments

Chris Maguire

A survey of more than 460 attorneys and decision makers working in corporate legal departments nationwide found that in-house teams, already stretched by limited resources, are confronting new and traditional challenges. Cybersecurity ranked among legal departments' biggest concerns for 2018.

Features

Phishing for Whales with Spears Image

Phishing for Whales with Spears

Eli Nussbaum

<b><i>What Your Organization Can Do to Protect Itself from Email-Based Attacks</b></i><p>There's no question that email has revolutionized the way we operate. Unfortunately, for all of its convenience, email has opened the door to serious security threats that include viruses, malware and fraud. Phishing scams have become a widespread problem — you'd be hard pressed to find anyone who hasn't been on the receiving end of a phishing attempt.

Features

Litigation over 'Ultra Music' Licensing Raises International Trademark Issues Image

Litigation over 'Ultra Music' Licensing Raises International Trademark Issues

Zach Schlein

A Miami, FL, federal jury ruled in favor of a Croatia-based production company in their trademark dispute with a titan of concerts, Ultra Music Festival.

Features

Supreme Court Forecloses Reimbursement for Certain Internal Investigations Under Mandatory Victims Restitution Act Image

Supreme Court Forecloses Reimbursement for Certain Internal Investigations Under Mandatory Victims Restitution Act

Marjorie Peerce & Mary K. Treanor

In Lagos v. United States, the U.S. Supreme Court ruled that corporate victims of criminal offenses cannot recover expenses incurred from internal investigations that the federal government has neither requested nor required under the Mandatory Victims Restitution Act of 1996,

Features

Understanding the Intersection Between GDPR and Cybersecurity Image

Understanding the Intersection Between GDPR and Cybersecurity

Jake Frazier & Anthony J. Ferrante

It's been about half a year since Europe's General Data Protection Regulation (GDPR) was activated, and corporate legal, privacy and compliance teams are beginning to adjust to the new lay of the land. We've seen early examples of enforcement activity, and those are helping organizations better understand the long-term landscape for compliance.

Features

Impact of EU's GDRP on Domain Registration Image

Impact of EU's GDRP on Domain Registration

Zach Warren

Since the GDPR's implementation, the “WHOIS” service by which the general public could search registration information, including names and contact info, has been largely in a state of flux. It's now even tougher to find information, attorneys who work with domain registration say, which could concern entertainment and intellectual property holders who want to go after infringing websites.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • INTERVIEW
    In this exclusive interview with International Franchise Association (IFA) chairman Steve Siegel, Associate Editor Kevin Adler, asks about policy priorities for 2003, and other legislative and regulatory developments that affect the franchise industry.
    Read More ›
  • Landlord & Tenant Law
    Questions of Fact About Whether Tenant Exercised Renewal Option Hearing Necessary to Determine Whether Landlord Can Remove Tenant to Complete Restoration Work Questions of Fact About Landlord Fraud Additional Security Deposit Constitutes Source of Income Discrimination
    Read More ›