Features
Protecting Your Company's Data from Security Breaches
This article explores some steps counsel can take to protect their organizations from a data breach, and how counsel can proactively help to mitigate any adverse impact in the unfortunate event a data breach occurs.
Features
The Art of Cyberwarfare
Cybersecurity is at a crossroads. No longer resigned to the confines of server rooms overseen by information technology, decisions regarding the protection of data have been forced into the boardroom by events that include breaches at main street businesses and revelations of clandestine government hacking activities.
Features
Attacking the Electronic Medical Record
The electronic age has paved the way for speedy retrieval of medical records. But the problem is that the electronic record is only as good as the individuals who input the information into the record itself.
Features
Data Sharing In the Cloud
Storing and sharing data "in the cloud" has become, in many instances, a business necessity. The practical and economic advantages of cloud computing are clear ' it eliminates the need to send client data via traditional, costly methods, and is significantly less expensive than building and maintaining the same data storage capacity in-house.
Columns & Departments
Court Watch
Franchisees and Dealers Should Plead Causation In Actions Against the Government <br>Michigan Court Transfers Case Brought By 41 Franchisees to Franchisor's Home State
Features
How to Fix Reputational Harm
The speed with which negative Internet postings spread can cause immediate reputational harm. To remedy this harm, the nature and extent of the damage must be quantified, which is no easy task. However, new digital tools can now be used to assess and quantify damage caused by these kinds of negative Internet postings.
Features
Managing Security Risks During Labor Disputes
Every company with union workers faces the risk of a labor dispute. Identifying any business risks and then managing them is a priority for executive decision-makers who must ensure that the company delivers its promises to stockholders, customers and employees. The process is well defined in business terms:
Features
The Ethical Duty to Be Competent in Technology and eDiscovery
Lawyers understand that they have an ethical duty to remain competent in the law and its practice. But far fewer are aware that an emerging body of legal-ethics rules and opinions say that lawyers also have a duty to be competent in relevant technology.
Features
<b><i>Online Extra:</b></i> NJ Legislature Moves on Cybersecurity Bill
The New Jersey Legislature on Oct. 5 began taking steps toward increasing its ability to combat cybercrime.
<b><i>Online Extra:</b></i> Google, Microsoft Strike Patent Peace Deal
Microsoft Corp. and Google Inc. have buried the hatchet on five years of patent litigation.The companies issued a joint statement on Sept. 30 announcing the conclusion of 20 cases being litigated in the United States and Europe. The agreement comes a week after a U.S. Court of Appeals for the Ninth Circuit decision resolving one of their most prominent disputes.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Bit PartsSummary Judgment Denied Defendant in Declaratory Action by Producer of To Kill a Mockingbird Broadway Play Seeking Amateur Theatrical RightsRead More ›
- One Overlooked Element of Executive Safety: Data PrivacyExecutives have access to some of the company's most sensitive information, and they're increasingly being targeted by hackers looking to steal company secrets or to perpetrate cybercrimes.Read More ›
- New York's Latest Cybersecurity CommitmentOn Aug. 9, 2023, Gov. Kathy Hochul introduced New York's inaugural comprehensive cybersecurity strategy. In sum, the plan aims to update government networks, bolster county-level digital defenses, and regulate critical infrastructure.Read More ›
- Law Firms are Reducing Redundant Real Estate by Bringing Support Services Back to the OfficeA trend analysis of the benefits and challenges of bringing back administrative, word processing and billing services to law offices.Read More ›
- Enhanced Oversight of Search Warrants and Title III WiretapsSearch warrants and wiretaps were once used primarily to investigate organized crime, drug dealing and terrorism. In recent years, however, prosecutors have employed these tools increasingly in the context of white-collar crime to the point where it is now commonplace.Read More ›