Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Information Sharing for the Information Age Image

Information Sharing for the Information Age

David Burg, Sean Joyce & Michael L. Bloom

As 2015 drew to a close, Congress agreed on a federal budget. That simple act, coming on the heels of a series of contentious continuing resolutions, was big news. But tucked away on page 694 of that 887-page bill was perhaps a more significant achievement. There Congress inserted, passed, and the President signed, the Cybersecurity Act of 2015.

Features

Gossip Column Has No Special Protection From Defamation Suit Image

Gossip Column Has No Special Protection From Defamation Suit

Celia Ampel

Just because it's on "Page Six" of the <i>New York Post</i> doesn't mean it cannot be defamatory, according to the U.S. Court of Appeals for the Eleventh Circuit. The appellate court revived a defamation lawsuit by a member of The Fugees hip-hop group against the <i>Post</i> for an item in its "Page Six" gossip column, finding reasonable readers might take the story as true.

Features

CFPB Takes Step Into Cybersecurity Regulation Image

CFPB Takes Step Into Cybersecurity Regulation

C. Ryan Barber

The Consumer Financial Protection Bureau (CFPB) has fired a shot across the bow of the burgeoning online-payment industry, taking an enforcement action this week that marked the agency's first foray into regulating cybersecurity.

Features

Intellectual Property Image

Intellectual Property

Lynne Strober, Jennifer Presti, Elizabeth Lai Featherman & Joan M. D'Uva

Intellectual Property (IP) is a highly complex type of property and, as we saw last month in Part One of this article, there are few cases addressing its valuation in the context of divorce. On top of this, because of the emphasis on mediation and arbitration, fewer cases are being litigated in the court system, resulting in fewer court decisions addressing these complex issues. That means there is less guidance for the practitioner, as different treatments of similar facts and great ways of addressing IP valuation remain unreported.

Features

<b><i>Online Extra:</b></i> Suit Against Hollywood Producers by 'Lost Boys' Clears Hurdle Image

<b><i>Online Extra:</b></i> Suit Against Hollywood Producers by 'Lost Boys' Clears Hurdle

R. Robin McDonald

A suit against Hollywood writers and producers by 54 refugees who became known as 'the Lost Boys' after they fled brutal persecution in Sudan has cleared an initial legal hurdle, a federal judge in Atlanta has ruled.

Features

<b><i>Online Extra:</b></i> Malware Increasingly Making Its Way into Organizations Through Social Media Image

<b><i>Online Extra:</b></i> Malware Increasingly Making Its Way into Organizations Through Social Media

Zach Warren

To say 'social media is everywhere' these days may be slightly archaic. Of course it's everywhere. Chances are, you're reading this article with at least one social media application running or open in a browser right now. But why, then, aren't these social media platforms as secure as they could be? A new 'Best Practices for Social Media Archiving and Security' survey from Osterman Research found that although enterprise and consumer-focused social platforms abound in modern organizations, social media remains a threat for many companies.

Features

<b><i>Online Extra:</b></i> Separating Truth from Lies: Website Tips for Small and Mid-Sized Firms Image

<b><i>Online Extra:</b></i> Separating Truth from Lies: Website Tips for Small and Mid-Sized Firms

Zach Warren

Experts at the 'Truth and Lies of the Internet for Lawyers' panel at ABA Tech Show 2016 in Chicago conducted the one hour discussion in a way similar to the TV show 'Mythbusters' ' dispelling some of the common myths told to small and mid-sized firms looking to build their own business.

<b><i>Online Extra:</b></i> Cybersecurity Professionals Apprehensive on Government Access to Encrypted Data Image

<b><i>Online Extra:</b></i> Cybersecurity Professionals Apprehensive on Government Access to Encrypted Data

Ian Lopez

A recent survey of security professionals takes these concerns to a new level, with 81% of respondents reporting they think it's 'very likely' or 'certain' that hackers can take advantage of the government's capability to access encypted data.

Features

<b><i>Online Extra:</b></i> Home Depot to Pay $13 Million to Settle Consumers' Data Breach Case Image

<b><i>Online Extra:</b></i> Home Depot to Pay $13 Million to Settle Consumers' Data Breach Case

R. Robin McDonald

The Home Depot will pay $13 million to resolve claims by customers whose personal information was exposed to hackers during a massive data security breach in 2014. The settlement agreement, filed in March in U.S. District Court in Atlanta, would certify a class of Home Depot customers to include all U.S. residents whose personal information was compromised after they used payment cards at self-checkout lanes at U.S. Home Depot stores between April 10, 2014, and Sept.'

Features

<b><i>Online Extra:</b></i> Dozens of Big Firms Targeted by Hacker Seeking M&A Info Image

<b><i>Online Extra:</b></i> Dozens of Big Firms Targeted by Hacker Seeking M&A Info

Nell Gluckman

For several years law firms have been a key target for hackers seeking to obtain confidential information about initial public offerings, intellectual property and M&amp;A deals, claim cybersecurity consultants, but rarely does word about specific attacks become public.On March 29, Crain's Chicago Business reported that 48 top firms, most of which appear in the Am Law 100 rankings, were targeted recently by a Russian hacker living in Ukraine seeking to trade on M&amp;A information stolen from law firms.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The FTC Gets Into the College Athlete NIL Game
    As national champions are crowned in men's and women's basketball, hundreds of thousands of college athletes are entering the influencer marketplace for the first time and now find themselves attractive candidates in the fast growing influencer marketing arena. With influencer marketing potentially providing a 5x return on investment, many brands are eager to get into the industry, but it doesn't come without risks as the FTC Commissioner is taking a closer look at the use of influencers for marketing.
    Read More ›
  • The Roadmap of Litigation Analytics
    Litigation analytics can be considered a roadmap of sorts — an important guide to ensure the legal professional arrives at the correct litigation strategy or business plan. However, like roadmaps, litigation analytics will only be useful if it's based on data that is complete and accurate.
    Read More ›