Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Ransomware – COVID-19 & Upgrading Your Defenses Image

Ransomware – COVID-19 & Upgrading Your Defenses

Jonathan Armstrong & André Bywater

It's pretty shameful that in the current crisis we're seeing ransomware on the rise. It's even more shameful that organizations involved in fighting the virus seem to be especially at risk.

Features

Facebook and Instagram Developers Sued for Privacy Violations In U.S. and UK Image

Facebook and Instagram Developers Sued for Privacy Violations In U.S. and UK

Alaina Lancaster

Facebook filed two separate lawsuits in the UK and U.S. that the company says is part of an ongoing effort to hold developers that abuse its platform accountable.

Features

The State of the e-Discovery and Data Privacy Job Market: Pre- and Post-COVID-19, Part 1 Image

The State of the e-Discovery and Data Privacy Job Market: Pre- and Post-COVID-19, Part 1

Jared Coseglia

Part One of a Two-Part Article This deep dive into the specific cause-and-effect paradigms impacting the data privacy and e-discovery verticals illustrates broader trends in the overall legal technology job market while simultaneously giving professionals in (or eager to be in) those disciplines a clear roadmap of where the legal technology, data privacy, and ESI job market was, is today, and where it will be in the future.

Features

Cybersecurity for Remote Workers: Keeping Financial Information Secure Image

Cybersecurity for Remote Workers: Keeping Financial Information Secure

Ashley Thomas

At the beginning of the COVID-19 pandemic, businesses scrambled to rapidly deploy a remote workforce which created new challenges for businesses to continue operating and providing critical services. It also created an opportunity for malicious actors to hack into and gain access to IT systems and sensitive, personal information.

Features

Where Will the Needle Land? Image

Where Will the Needle Land?

Scott Pink & John Dermody

COVID-19 Contact Tracing v. Protecting Personal Privacy As states roll back stay-at-home orders, contact tracing has quickly emerged as an essential tool to manage the spread of the coronavirus and allow the country to return to work safely. But innovative contact tracing methods raise a host of privacy concerns, forcing a reckoning with how we balance privacy and public health.

Features

Synchronizing Legal Hold Requirements With Consumer Requests for Data Deletion Image

Synchronizing Legal Hold Requirements With Consumer Requests for Data Deletion

Mike Hamilton

The biggest challenge with any legal hold process is ensuring that potentially relevant data is actually preserved. But with evolving requirements for how data is managed by new data privacy laws like the CCPA and the GDPR, it's become harder to secure data by simply sending a legal hold and assuming the custodian will do their duty to preserve it.

Features

How To Avoid Cybersecurity Challenges Brought On By the Pandemic Image

How To Avoid Cybersecurity Challenges Brought On By the Pandemic

Tomas Suros

As the current pandemic has forced much of the world into virtual workforce mode, cybercriminals have seized on the uncertainty of the current times to launch new and creative offensives. Fears surrounding COVID-19 are high, conspiracy theories are running rampant, and cyberattackers are counting on stress and distraction to decrease our vigilance against intrusions.

Features

Where Will The Needle Land? COVID-19 Contact Tracing v. Protecting Personal Privacy  Image

Where Will The Needle Land? COVID-19 Contact Tracing v. Protecting Personal Privacy 

Scott Pink & John Dermody

Governments and businesses alike are considering how to leverage new technologies to make contact tracing efforts more effective by digitally monitoring our social interactions and physical locations. But such innovative contact tracing methods raise a host of privacy concerns, forcing a reckoning with how we balance privacy and public health.

Features

Recent Decisions Clarify Scope of Illinois Biometric Privacy Law Image

Recent Decisions Clarify Scope of Illinois Biometric Privacy Law

Frank Nolan & Andrew Weiner

For users of biometric information subject to BIPA's rigorous requirements, the last two years have brought mostly bad news, most notably a smattering of unfavorable decisions on the question of whether plaintiffs must suffer an injury in order to avail themselves of BIPA. Against this backdrop, however, courts have issued decisions on other aspects of BIPA

Features

How Privacy Laws Shape COVID-19 Reopening Plans Image

How Privacy Laws Shape COVID-19 Reopening Plans

Justin Eichenberger & Mary Fuller

When it comes to processing personal information, Americans do not have a general right to privacy because the United States does not have a comprehensive privacy law. That does not mean, however, that employers are not subject to other privacy requirements.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategic Uses of a Rule 2004 Exam
    While most bankruptcy practitioners are familiar with the basic concepts behind the Rule 2004 exam, some are less familiar with the procedural intricacies of obtaining, conducting, and responding to the exam ' intricacies that often involve practices and procedures adapted from civil discovery that are beyond the scope of pure bankruptcy practice. This article explains.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›