Features

China Finalizes New Regulations to Relax Personal Data Exports from China
Nearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.
Features

Unraveling The American Data Privacy Patchwork: Will the American Privacy Rights Act Succeed?
As the focus on protecting personal data continues to grow with the ever-widening adoption of artificial intelligence (AI) tools, exponential increases in the number and breadth of data breaches, and growing awareness of the risk posed by data brokers, the time appears right for a U.S. federal data privacy regulation to succeed in Congress. But is the new American Privacy Rights Act that regulation?
Features

The Perfect Storm: Why Contract Hiring In Privacy Will Eclipse Direct Hiring In 2024
With significantly fewer fully remote positions available in 2023, active job seekers were faced with the question of whether to begin considering compromises on work-from-home flexibility or compromise in other areas like compensation, vertical mobility, quality of life, or employment modality.
Features

Lessons for CISOs from the SolarWinds Breach and SEC Enforcement
In an era where digital threats loom large, the responsibilities of Chief Information Security Officers have expanded beyond traditional IT security to encompass a broader governance, risk management, and compliance role. The infamous SolarWinds Corp. attack illustrates the complex cybersecurity landscape CISOs navigate.
Features

Shielding Law Practices: Mitigating Vendor Risks to Safeguard Client Confidentiality
Because vendors often access clients' internal systems, customer data, and intellectual property, they will always be a magnet for hackers searching for valuable data. Bad actors will always look for the weak spots in a firm's defenses, including those deployed by a firm's vendors and other third parties. And signs point to a growing number of cyberattacks, not a lessening of them.
Features

A Roadmap for Implementing Information Governance In Law Firms
In today's digital age, the volume of data generated and managed by law firms has skyrocketed, presenting both opportunities and challenges. Unfortunately, in parallel with this exponential growth in data, and partially as a direct result of it, law firms have also experienced a significant increase in targeted cyberattacks.
Features

Navigating Custody and Control: Ownership of Smartphone Data and Enforcement of Usage Policies
New regulations from the DOJ around the ownership and governance of company data on personal devices are catching up to the way the world actually works. It's going to make companies' lives a lot harder — and for precisely the same reason that smartphones have made their lives a lot easier.
Features

Is Genetic Information the Next Privacy Battleground?
GIPA litigation remains in its early stages, but the possibility of exorbitant statutory damages could make GIPA the next major trend in privacy class action litigation.
Features

New Federal Privacy Legislation Has Legitimate Shot At Passing
For years, the business community has been calling for a comprehensive federal privacy law, frustrated with operating under a patchwork of sometimes-conflicting state laws. Now, Congress is considering one that's extremely wide-ranging and that observers say has a legitimate chance of passage.
Features

Unbiased Thinking: A Blueprint for Your Law Firm Billing & Collections Transformation
Law firms generally experience a similar set of common challenges and costs tied to inefficient billing and collections practices. This is a cost no firm can afford; and to that end, this article offers a blueprint for transforming billing and collections
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- When Is a Repair Structural or Nonstructural Under a Commercial Lease?A common question that commercial landlords and tenants face is which of them is responsible for a repair to the subject premises. These disputes often center on whether the repair is "structural" or "nonstructural."Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- The Cost of Making PartnerMaking partner isn't cheap, and the cost is more than just the years of hard work and stress that associates put in as they reach for the brass ring.Read More ›