Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Podcast: Phishing Image

Podcast: Phishing

Jason Thomas

Phishing is one of the more pervasive cyber attacks in the world, and while we've all received phishing emails, phishing attacks have become more sophisticated and come in different forms other than emails from Persian princes.

Features

What Lies Beneath the Surface: The Dark Web Image

What Lies Beneath the Surface: The Dark Web

Elizabeth Vandesteeg & Jeffrey Goldberg

This article provides a basic outline of the structure of the Web and some insight as to the purpose for and content housed on each level, as well as give some practical tips to avoid your company's data from ending up on the Dark Web.

Features

SCOTUS Takes Up Microsoft Case on Email Privacy Image

SCOTUS Takes Up Microsoft Case on Email Privacy

Tony Mauro

A long-running dispute between Microsoft and the Justice Department over providing the government with certain customer emails in criminal investigations will be refereed by the U.S. Supreme Court.

Features

Fantasy Sports Dispute Results in New Views On Exceptions to Rights of Publicity Image

Fantasy Sports Dispute Results in New Views On Exceptions to Rights of Publicity

Stan Soocher

The big news in the fantasy sports arena this past summer was the announcement that competitors FanDuel and DraftKings, which make up more than 90% of the online market, would end their merger bid following the Federal Trade Commission's filing of an antitrust lawsuit against the companies. Now, there's good news for FanDuel and DraftKings on a different front, involving the use of athletes' personality components.

Features

Social Media: Questions of Admissibility and Ethics Image

Social Media: Questions of Admissibility and Ethics

Khizar A. Sheikh, Lynne Strober & Jennifer Presti

<b><i>Part One of a Two-Part Article</i></b><p>This two-part article is divided into three sections: 1) Social media, defined; 2) Examples of how social media has been used in family law cases; and 3) Ethical considerations for attorneys who gather social media evidence.

Features

The Privacy Shield Scheme: Should Your Company Join? Image

The Privacy Shield Scheme: Should Your Company Join?

Jonathan Armstrong & André Bywater

The purpose of this article is to shed some light on the EU-US Privacy Shield for business. This is vital in order to enable businesses to make an informed decision on whether or not to join this scheme.

Features

New Sources of Discoverable Evidence Image

New Sources of Discoverable Evidence

Michael Ciaramitaro

<b><i>Part Two of a Two-Part Article</i></b><p>Last month, the author discussed some of the technologies people are using today, such as fitness trackers and intelligent personal assistants, and the e-discovery implications they entail. Like these, automotive "Black Boxes" and drones could yield important information for those seeking evidence in a legal action.

Features

Data Security and Data Breach Response Continue to Be a Hot Issue Image

Data Security and Data Breach Response Continue to Be a Hot Issue

Kevin Coy

<b><i>Lessons from 2017 Enforcement Actions and Guidance</b></i><p>Regulators including the FTC, the Department of Health and Human Services Office of Civil Rights (OCR) — the agency responsible for enforcing the HIPAA rules for protected health information (PHI) — and state attorneys general have issued guidance and announced a number of settlements in data security cases that are instructive about measures that organizations can take to reduce the potential for a data breach or, if a breach does occur, provide appropriate notice.

Features

Security First Approach Provides a Significant Advantage to Law Firms Image

Security First Approach Provides a Significant Advantage to Law Firms

Mark Sangster

The security industry all too often sells the next shiny object touted as the Holy Grail of security that protects against all cyber threats. And the following year, the next best thing hits the market and becomes the grail until proven fallible.

Features

Equifax Breach Will Fuel Identity Theft Remediation Debate Image

Equifax Breach Will Fuel Identity Theft Remediation Debate

Angela R. Matney

In the wake of suits filed against Equifax by consumers, businesses and governmental units, courts will have to grapple with the question of what remedies are appropriate. These issues are not unique to the Equifax incident, but the scope of the breach will undoubtedly lead to more debate than ever before.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Anti-Assignment Override Provisions
    UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?
    Read More ›