Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Book Review: Cybersecurity Program Development for Business: The Essential Planning Guide Image

Book Review: Cybersecurity Program Development for Business: The Essential Planning Guide

Adam Schlagman

While many business owners and executives understand that a data security problem/need exists, they do not have a baseline fluency in the concepts and alphabet soup that comprise the language of digital information security. To this extent, Chris Moschovitis' new book is an effective cybersecurity primer for the management community.

Columns & Departments

Bit Parts

Stan Soocher

Cryptocollectible Concept Denied Trade Secret Protection<br>Jefferson Starship Co-Founder Loses Anti-SLAPP Motion Against Current Members of Band

Features

Blockchain and GDPR — Frenemies? Image

Blockchain and GDPR — Frenemies?

Justin Hectus & Kristy Sambor

In a nutshell, GDPR mandates that individuals have access and control over the use and maintenance of their data in certain circumstances, while the foundation of blockchain relies on the immutability of data. On the surface, these concepts seem in direct conflict with each other. This article discusses the points where GDPR and blockchain share common ground, where conflicts may exist and possible approaches for mitigating those conflicts.

Features

Why Encryption Is the Key to Ensure Data Privacy in the Cloud Image

Why Encryption Is the Key to Ensure Data Privacy in the Cloud

Linus Chang

At both a personal and corporate level, there are huge gains to be made in protecting against data breaches. The fact is that well-implemented client-side encryption — where the corporate user keeps their own key rather than entrusting a third party to guard their sensitive information — is the only sure way to guarantee data privacy when storing data on other people's servers.

Features

This is Not Your Father's Cloud (Part Two) Image

This is Not Your Father's Cloud (Part Two)

Adam Cohen

<b><i>Part Two of a Two-Part Article</b></i><p>In Part One of this article last month, we began a discussion designed to demystify the hesitations behind cloud security and analyzed the fast-growing transformation to a range of newer technical approaches with important consequences for legal practice. This month we continue the discussion by tackling the security and legal implications of the mass transformation of enterprise IT to cloud services from leading providers such as AWS and Azure.

Features

Balancing Fourth Amendment Expectations in the Electronic Era Image

Balancing Fourth Amendment Expectations in the Electronic Era

Jonathan S. Feld, Dante Stella & Christina Brunty

As rapid technological changes in the 21st century continue to expand the types and volume of private electronic information, the Fourth Amendment's privacy protections are evolving. The critical question in Fourth Amendment cases is whether a person has a “reasonable expectation of privacy in the information or event.”

Features

Cryptography's Legal Landscape Image

Cryptography's Legal Landscape

Paul McGough

The same applications, and the same cryptographic protocols, don't function in the exact same ways when appearing in 'the same software' utilized in different control devices. What, if any, are the legal ramifications of differing delivery mechanisms for the same cryptographic functions that may or may not perform the same?

Features

You're Fired! Image

You're Fired!

Brenda L. Thompson

<i><b>Dealing With a Job Loss</b></i><p>The chances are that many of us will either be terminated or laid off from at some point in our careers. It happens. How you deal with the loss of a job and get back on your feet as quickly as possible is what's important.

Features

The DOJ's Latest Opioid Crime-Fighting Tool: The Civil False Claims Act Image

The DOJ's Latest Opioid Crime-Fighting Tool: The Civil False Claims Act

Nekia Hackworth Jones

<b><i>The U.S. Department of Justice Is Now Using The False Claims Act — Traditionally a Civil Enforcement Tool — to Combat the United States' Sweeping Opioid Epidemic</b></i><p>The use of the FCA is part of a larger DOJ strategy to develop multi-faceted solutions for this public health emergency.

Features

Fifth Circuit Affirms Shareholder Veto of Chapter 11 Petition Image

Fifth Circuit Affirms Shareholder Veto of Chapter 11 Petition

Michael L. Cook

“Federal law does not prevent a bona fide shareholder from exercising its right to vote against a bankruptcy petition just because it is also an unsecured creditor,” held the U.S. Court of Appeals for the Fifth Circuit in <i>In re Franchise Services of North America, Inc.</i> According to the court, applicable Delaware law would not “nullify the shareholder's right to vote against the bankruptcy petition.”

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES