Features

Companies Poised To Repeat Data Privacy Compliance Mistakes
<b><i>New Study Shows U.S. Companies Are Taking the Same Failed Approach To Complying With California's Privacy Regulation As They Did for GDPR</b></i><p>U.S. companies haven't learned much from the missteps they made while preparing for the European Union's General Data Protection Regulation (GDPR), suggests a new study on data privacy regulation compliance.
Features

State Report: New NJ Data Breach Notification Legislation Signed
Legislation expanding the types of personal data that will trigger a required notification to customers in case of a breach, including email addresses and passwords, was signed into law by Gov. Phil Murphy.
Features

The Nice-to-Haves and Need-to-Haves of Cloud Computing
This article discusses what to look for in a cloud service provider and other issues that will help determine if moving to the cloud is the right move for your firm.
Features

The Eyes (and Privacy Laws) of Texas Are Upon You
<b><i>Consistent With the Cliché That “Everything's Bigger In Texas,” the Texas Legislature Has Introduced Not One, But Two Separate Bills Relating to the Privacy of Personal Information</b></i><p>The TPPA is arguably the less onerous of the two bills, although you might not necessarily realize it at first blush, given the broad way it defines “personal identifying information” (PII).
Features

Safeguarding Client Data: An Attorney's Duty to Provide 'Reasonable' Security
Effective cybersecurity requires an ongoing, risk-based, comprehensive process that addresses people, policies and procedures, and technology, including training. Effective security also requires an understanding that security is everyone's responsibility and constant security awareness by all users of technology.
Features

Getting Ready for Wide-Ranging Reach of California's Data Privacy Law
The CCPA is the first of its kind, generally applicable data protection law in the United States. What makes the CCPA unique is not only its applicability to companies like those in the entertainment and media industries, but also the rights it provides to consumers regarding their personal information (PI).
Features

The Principles of Good Cyber Risk Management
Apart from headline grabbing attacks, we are now seeing an epidemic of cyber attacks. Concern has shifted from dealing with data being stolen and sold on the dark Web to handling serious ransomware and destructive attacks, where attackers are looking for immediate monetary output.
Features

Second Circuit Blocks Video Privacy Suit Brought Against Barnes & Noble
A would-be class action against Barnes & Noble could have cost the bookseller hundreds of millions of dollars — not to mention a reputational hit for allegedly sharing private information about its customers' online video purchases with Facebook.
Features

Privacy Notices, Opt-In Clauses Debated as U.S. Regulators Shape Federal Privacy Law
Tech giants' privacy counsel and U.S. senators discussed opt-in policies, lengthy, legalese-filled privacy notices and location tracking. The discussion aimed to further shape a potential U.S. federal data privacy law.
Features

Second Circuit Blocks Video Privacy Suit Brought Against Barnes & Noble
A would-be class action against Barnes & Noble could have cost the bookseller hundreds of millions of dollars — not to mention a reputational hit for allegedly sharing private information about its customers' online video purchases with Facebook.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- Why So Many Great Lawyers Stink at Business Development and What Law Firms Are Doing About ItWhy is it that those who are best skilled at advocating for others are ill-equipped at advocating for their own skills and what to do about it?Read More ›
- The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business AlliesPractical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.Read More ›
- Best Practices for Virtual Internal InvestigationsIn order to ensure that remote internal investigations are probative and effective, companies and their outside counsel should employ a few simple and practical practices.Read More ›
- Hiring Practices and the FCPAWhile laws such as the FCPA do not necessarily prohibit hiring individuals with criminal records or bad credit records or who are former government officials, they do require employers to identify these individuals and assess whether their hire would pose a threat, violate the laws outright or impose an administratively difficult burden due to the need to monitor their activities.Read More ›