Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

New Jersey's Latest Effort on the Privacy Front Image

New Jersey's Latest Effort on the Privacy Front

Kenneth K. Dort & Mitchell S. Noordyke

New Jersey legislators are joining a growing line of states in proposing a bill to strengthen data privacy protections, following in the footsteps of privacy laws enacted in Europe and California.

Features

A CCPA Private Right of Action on the Horizon Image

A CCPA Private Right of Action on the Horizon

David Keating, Jim Harvey & Dan Felz

Class Action Complaints Test Whether Plaintiffs Can Sue for Any Violation of the CCPA This article provides an overview of how the CCPA addresses private rights of action, summarizes recent class action complaints that attempt to use CCPA violations as the basis for class-wide claims, and provides suggestions for prioritizing activity in CCPA compliance programs in this new litigation environment.

Features

Privacy Is Top Priority But Spending Will Decrease, Survey Says Image

Privacy Is Top Priority But Spending Will Decrease, Survey Says

Frank Ready

Exterro's Annual Study of Legal Spend Management indicates that organizations are expecting to spend less on compliance with privacy laws in 2020 as they wait to see how new regulations like the CCPA are enforced first.

Features

Judge Warns Facebook in Approving Record $5B Fine for Alleged Privacy Violations Image

Judge Warns Facebook in Approving Record $5B Fine for Alleged Privacy Violations

Jacqueline Thomsen

The Judge Pointed Out that Some FTC Commissioners Wanted to Specifically Sanction Facebook Founder Mark Zuckerberg for the Company Sharing Private User Data With Outside Parties A federal judge in Washington, DC, signed off on a record $5 billion fine imposed by the U.S. Federal Trade Commission on Facebook for allegedly violating federal law and a previous order with its privacy practices.

Features

Coronavirus Work-from-Home Response A Boon for Cybercriminal Exploitation Image

Coronavirus Work-from-Home Response A Boon for Cybercriminal Exploitation

Mark Sangster

Companies determined to protect their employees and minimize the impact of COVID-19 are enforcing travel restrictions and strong work-from-home policies. However those actions can be used against employees as any firms are likely unprepared for the criminal appetite for the cyberattack exploitation of a remote workforce. Here are some of the key issues of which law firms and companies need to be aware and steps that should be considered to minimize the risk to keep everyone — and client data — safe.

Features

COVID-19: Threats Abound: How to Protect Your Remote Workforce Image

COVID-19: Threats Abound: How to Protect Your Remote Workforce

Tomas Suros

The COVID-19 pandemic has changed the conversation around remote work. As more employees work remotely, law firms must employ security best practices to ensure that the extended reliance on the cloud doesn't expose sensitive data or cripple daily operations. Following is a practical checklist of systems, technologies and processes to consider when evolving your firm for remote work and selecting your cloud technology provider.

Features

COVID-19: Companies, Trade Organizations Seek to Postpone CCPA Enforcement Date Image

COVID-19: Companies, Trade Organizations Seek to Postpone CCPA Enforcement Date

Dan Clark

Over 30 trade associations and companies co-signed a letter last month to California Attorney General Xavier Becerra asking him to push back the enforcement date for the California Consumer Privacy Act due to the new coronavirus and a lack of clarity on the enforcement rules.

Features

The California Consumer Privacy Act is HERE: Are You Litigation Ready? Image

The California Consumer Privacy Act is HERE: Are You Litigation Ready?

Ann Marie Mortimer, Jason J. Kim & Lisa J. Sotto

Most companies doing business in California are well aware of the CCPA and prepared diligently in advance of the law's Jan. 1, 2020 compliance deadline. While compliance certainly is key, even compliant businesses must consider — and prepare for — the eventual onslaught of class action litigation that is coming.

Features

States Take the Lead on Securing IoT Image

States Take the Lead on Securing IoT

Ashley Thomas

The California IoT Security Law is the first of its kind in the nation and pushes device manufacturers to adopt cybersecurity standards during the product development and design stages where none have existed before.

Features

Coronavirus Work-from-Home Response A Boon for Cybercriminal Exploitation Image

Coronavirus Work-from-Home Response A Boon for Cybercriminal Exploitation

Mark Sangster

Here are some of the key issues of which law firms and companies need to be aware and steps that should be considered to minimize the risk to keep everyone — and client data — safe.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategic Uses of a Rule 2004 Exam
    While most bankruptcy practitioners are familiar with the basic concepts behind the Rule 2004 exam, some are less familiar with the procedural intricacies of obtaining, conducting, and responding to the exam ' intricacies that often involve practices and procedures adapted from civil discovery that are beyond the scope of pure bankruptcy practice. This article explains.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›