Account

Sign in to access your account and subscription

Register

LJN Newsletters

  • It's important to have a restorative plan in addition to a preventative plan for your IT systems. Here are a few steps a law firm can take to ensure critical case data remains intact and accessible after a cybersecurity breach.

    August 01, 2017Jeff Ton
  • The scope of WannaCry changed our perceptions of ransomware attacks. Until then, the more highly publicized ransomware incidents were localized targets impacting only one or a small number of businesses. WannaCry made it clear that ransomware could reach a broad cross-section of computers worldwide, at essentially the same time.

    August 01, 2017India E. Vincent
  • This article examines the guidelines published by Board of Governors of the Federal Reserve System on managing outsourcing risk, along with the Office of the Comptroller of the Currency (OCC) 2013 OCC Bulletin 2013-29 and the supplemental Jan. 24, 2017, examination procedures, which are designed to help bank examiners tailor the examinations of national banks and federal savings associations determine the scope of the third-party risk management examination.

    August 01, 2017David F. Katz, Richard D. Smith, Elizabeth K. Hinson, Jason Mark Anderman and Sarah Statz
  • In a recent case, the U.S. Supreme Court applied what has come to be known as the Penn Central balancing test to uphold New York City's refusal to approve an office tower atop Grand Central Terminal.

    August 01, 2017Stewart E. Sterk
  • Defendants in entertainment industry cases often invoke California's "anti-SLAPP" statute, Calif. Civ. Code §425.16, which is meant to bar lawsuits filed to muffle free speech activities or a legal right to petition. This summer, some noteworthy court decisions have come out of California that involved anti-SLAPP motions filed by attorneys who are defendants themselves in entertainment litigations.

    August 01, 2017Stan Soocher
  • While day-to-day maintenance tasks and insider risk protocols are important for long-term protection from different types of cybersecurity threats, it's important to acknowledge that no solution is 100% effective. No matter how much money a firm is currently investing in cybersecurity, the reality is that it only takes one wrong click for a breach to occur.

    August 01, 2017Jeff Ton