Features
<b><i>Online Extra:</b></i> Malware Increasingly Making Its Way into Organizations Through Social Media
To say 'social media is everywhere' these days may be slightly archaic. Of course it's everywhere. Chances are, you're reading this article with at least one social media application running or open in a browser right now. But why, then, aren't these social media platforms as secure as they could be? A new 'Best Practices for Social Media Archiving and Security' survey from Osterman Research found that although enterprise and consumer-focused social platforms abound in modern organizations, social media remains a threat for many companies.
Features
<b><i>Online Extra:</b></i> Separating Truth from Lies: Website Tips for Small and Mid-Sized Firms
Experts at the 'Truth and Lies of the Internet for Lawyers' panel at ABA Tech Show 2016 in Chicago conducted the one hour discussion in a way similar to the TV show 'Mythbusters' ' dispelling some of the common myths told to small and mid-sized firms looking to build their own business.
<b><i>Online Extra:</b></i> Cybersecurity Professionals Apprehensive on Government Access to Encrypted Data
A recent survey of security professionals takes these concerns to a new level, with 81% of respondents reporting they think it's 'very likely' or 'certain' that hackers can take advantage of the government's capability to access encypted data.
Features
<b><i>Online Extra:</b></i> Home Depot to Pay $13 Million to Settle Consumers' Data Breach Case
The Home Depot will pay $13 million to resolve claims by customers whose personal information was exposed to hackers during a massive data security breach in 2014. The settlement agreement, filed in March in U.S. District Court in Atlanta, would certify a class of Home Depot customers to include all U.S. residents whose personal information was compromised after they used payment cards at self-checkout lanes at U.S. Home Depot stores between April 10, 2014, and Sept.'
Features
<b><i>Online Extra:</b></i> Dozens of Big Firms Targeted by Hacker Seeking M&A Info
For several years law firms have been a key target for hackers seeking to obtain confidential information about initial public offerings, intellectual property and M&A deals, claim cybersecurity consultants, but rarely does word about specific attacks become public.On March 29, Crain's Chicago Business reported that 48 top firms, most of which appear in the Am Law 100 rankings, were targeted recently by a Russian hacker living in Ukraine seeking to trade on M&A information stolen from law firms.
Features
<b><i>Online Extra:</b></i> Chipotle in Trouble Again, This Time With the NLRB
It hasn't been an easy couple of months for Denver-based fast casual food giant Chipotle Mexican Grill Inc. And now a decision from the National Labor Relations Board has shone a negative light on the company's social media policies and labor practices too.
Features
<b><i>Online Extra:</b></i> Judge Scheindlin Praised by e-Discovery Leaders for Departing from the Bench
e-Discovery experts this week praised the career and 'seminal' rulings from Judge Shira A. Scheindlin, who is stepping down this month from her role as a judge for the Southern District of New York.
Columns & Departments
Upcoming Event
SXSW Music Conference 2016 CLE Program. Austin, TX, March 18-19.
Features
ADA Coverage Still Evolving After 25 Years
The ADA) has prohibited discrimination against qualified individuals based on their disabilities across the United States for the last 25 years. It has required employers to implement reasonable accommodations for a qualified individual's disability. A critical question facing employers is what medical conditions qualify as a disability that must be accommodated to comply with federal law.
Columns & Departments
Bit Parts
Determining the Statute of Limitations for Common Law Copyright Infringement Claims<br>Continuous Accrual Doctrine Applied To Songwriter Heirs' Royalty Suit over Disney's Movie
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- When It Comes to Trademark Searches, AI Misses the MarkArtificial intelligence tools powered by large language models have become valuable resources in the trademark process. Despite incredible progress in natural-language reasoning, AI tools still face fundamental limitations when it comes to performing even basic trademark searches. Here are five important reasons why.Read More ›
