Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Employee Privacy and Corporate Legal Risk Image

Employee Privacy and Corporate Legal Risk

David Horrigan

The use of business email accounts and digital devices for personal communications can be risky for both employers and employees. However, employees of all levels may be commingling corporate communications with their personal information, according to new research.

Features

Internet Legal Ethics and Client Privacy Image

Internet Legal Ethics and Client Privacy

Jonathan Bick

Internet professional responsibility and client privacy difficulties are intimately associated with the services offered by lawyers. Electronic attorney services result in data gathering, information exchange, document transfers, enhanced communications and novel opportunities for marketing and promotion. These services, in turn, provide an array of complicated ethical issues that can present pitfalls for the uninitiated and unwary.

Features

7 Tips to Make a Cyber Attack Comeback Image

7 Tips to Make a Cyber Attack Comeback

Jeff Ton

It's important to have a restorative plan in addition to a preventative plan for your IT systems. Here are a few steps a law firm can take to ensure critical case data remains intact and accessible after a cybersecurity breach.

Features

WannaCry Attack Is A Wake-Up Call for Cyber Preparedness Image

WannaCry Attack Is A Wake-Up Call for Cyber Preparedness

India E. Vincent

The scope of WannaCry changed our perceptions of ransomware attacks. Until then, the more highly publicized ransomware incidents were localized targets impacting only one or a small number of businesses. WannaCry made it clear that ransomware could reach a broad cross-section of computers worldwide, at essentially the same time.

Features

The Role of Encryption in Law Firm Data Security Image

The Role of Encryption in Law Firm Data Security

David Greetham & David Levine

Encryption can play a vital role in securing data, but it needs to be considered within the context of a firm's overall IT security strategy. Whether, when and how to encrypt requires a careful look at what data the firm keeps, and how much protection it needs. This article explains how encryption can be used to guard against the reputational, financial and legal damage a breach of sensitive data can cause to law firms.

Features

Cyber Crime Now Targeting Law Firms Image

Cyber Crime Now Targeting Law Firms

Collin Hite

<b><i>Is Your Firm Truly Prepared?</b></i><p>Cyber attacks and theft are on the rise around the country, and law firms are becoming prime targets. Similar to healthcare providers, a law firm's data can be the gold standard. Unlike manufacturers, banks and retailers, law firms are unique organizations that result in them being highly vulnerable.

Features

Ransomware Attack on DLA Piper Puts Law Firms, Clients on Red Alert Image

Ransomware Attack on DLA Piper Puts Law Firms, Clients on Red Alert

Roy Strom

The ransomware attack on June 27 on DLA Piper sounded an alarm for Big Law. The world's biggest firms are just as prone to ransomware attacks as any other company, and the potential ramifications of a network-crippling malware infection are wide-ranging for a service industry that holds the legal fate of corporations in its palm.

Features

Trial Judge Acts Over Hacking of Plaintiffs' Emails In Media Dispute Image

Trial Judge Acts Over Hacking of Plaintiffs' Emails In Media Dispute

Jason Grant

A New York trial court judge struck a defendant's answer in a media-based breach of fiduciary duty and unfair competition suit, after finding that 2,000 emails, including attorney-client privileged information possessed by the plaintiffs, had been hacked and stolen.

Features

WannaCry Attack Is A Wake-Up Call for Cyber Preparedness Image

WannaCry Attack Is A Wake-Up Call for Cyber Preparedness

India E. Vincent

The scope of WannaCry changed our perceptions of ransomware attacks. It made it clear that ransomware could reach a broad cross-section of computers worldwide, at essentially the same time.

Features

Asserting Damages for Data Piracy Under the CFAA Image

Asserting Damages for Data Piracy Under the CFAA

Shari Claire Lewis

When a database is breached in one way or another, the results can be devastating. Many companies suffering this kind of loss turn to litigation, often under the Computer Fraud and Abuse Act, which prohibits improperly accessing a protected computer. There is, however, a growing consensus in the Second Circuit that recovery of certain forms of damages under the CFAA simply is not permitted.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Anti-Assignment Override Provisions
    UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?
    Read More ›