Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Hybrid Storage in Virtualized Environments Image

Hybrid Storage in Virtualized Environments

Jeremy DeHart

With an eye toward further virtualizing Hedrick Gardner's IT operations with virtualized desktops, we embarked on a project to evaluate solid state storage systems

Columns & Departments

e-Commerce News Image

e-Commerce News

ALM Staff & Law Journal Newsletters

Google Beats Web Browser Privacy Class Action<br>Washington University Debuts Cybersecurity Master's Program

Features

Legal Battle Plans Image

Legal Battle Plans

J.T. Westermeier

Cyber security incidents are rising very rapidly. The growing number of serious attacks on essential cyber networks is one of the most serious threats the U.S. faces. One of the critical controls relating to cyber security incidents is the implementation of effective cyber security incident response plans. This article recommends that legal battle plans be developed and maintained as a critical part of your cyber security incident response plans.

Features

Data Encryption And the Law Image

Data Encryption And the Law

Richard Raysman & Peter Brown

This article discusses several of the pressing matters within the realm of data encryption, including: the Constitutional concerns that arise when an individual is forced by the government to divulge encrypted data; the recent disclosures in the press of government involvement with encrypted data; and the current global legal climate in which these issues are situated.

Features

Salespeople at Law Firms? Image

Salespeople at Law Firms?

Silvia L. Coulter

Research over the past four years is showing a slow-moving upward trend of law firms hiring professional salespeople. This trend spans all sizes of firms, from small to global. The backgrounds of these professionals varies; primarily, they come to firms from a solid background of success in the sales world, many having worked against assigned quotas and on partial commission.

Features

Read the Fine Print Image

Read the Fine Print

Kevin Adler

The difficulties of securing important company and customer data are not new to franchised businesses, but the scale of the problem continues to increase. A new white paper by insurance consultants Peter R. Taffae and M. Damien Magnuson indicate another threat: inadequate insurance coverage when security breaches occur.

Features

The Media Image

The Media

Linda Crawford

While the media creates the impression of an out-of-control tort system, this is out of alignment with actual jury behavior.

Features

Practice Tip: Why Product Manufacturers Should Heed Privacy Trends Image

Practice Tip: Why Product Manufacturers Should Heed Privacy Trends

Jacob Herstek

A recent jury verdict and consumer survey indicates that privacy is touchstone issue for a majority of consumers.

What Remains of CE-Style Insurance Neutrality After GIT? Image

What Remains of CE-Style Insurance Neutrality After GIT?

Robert D. Goodman & Miranda H. Turner

Among the most hard-fought battles involving insurers, policyholders, and asbestos claimants are those that have played out in courts called upon to review orders confirming plans of reorganization in asbestos bankruptcies.

Liabilities Image

Liabilities

Michael Goldman

This article is the seventh installment in an ongoing series focusing on accounting and financial matters for corporate counsel

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • "Holy Fair Use, Batman": Copyright, Fair Use and the Dark Knight
    The copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.
    Read More ›