Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Causation and Harm In Data Breach Litigation Image

Causation and Harm In Data Breach Litigation

Brian Ellman & Jee-Yeon Lehmann

Demonstrating that a data breach has resulted in an injury-in-fact can be difficult, because it is not always clear what has happened or will happen with the stolen data.

Features

Implications of GDPR & CCPA on Public Records Image

Implications of GDPR & CCPA on Public Records

Jeff Cox

This article discusses the importance of securing a safe harbor for court records through reviewing an illustrative example of how a European Union (EU) citizen was able to force U.S. legal technology companies to remove and alter court records using GDPR.

Features

Cloudy With a Chance of IoT attacks: The Cybersecurity Forecast for 2019 Image

Cloudy With a Chance of IoT attacks: The Cybersecurity Forecast for 2019

Leigh-Anne Galloway

2018 was a trying year for the cybersecurity industry, with breaches increasing and showing no signs of slowing as we enter the New Year. 2019 will bring its own threats with the propagation of new technology — 5G and IoT — and their security vulnerabilities. However, there's also progress on the horizon, thanks to more stringent government regulation and increasing legal action.

Features

What the U.S.' Pursuit of Foreign Nation-State Hackers Means for Cybercrime Victims and Targets Image

What the U.S.' Pursuit of Foreign Nation-State Hackers Means for Cybercrime Victims and Targets

Ronald Cheng & Mallory Jensen

For years, the U.S. has maintained an active enforcement campaign against overseas cyber criminals and while these past efforts have not been haphazard, they have not necessarily been part of a specific drive to address the serious issue of foreign cybercrime committed by nation states. Recent announcements by the DOJ show that this enforcement campaign is accelerating and expanding.

Features

Q&A with Women Leaders in Cybersecurity and Privacy Image

Q&A with Women Leaders in Cybersecurity and Privacy

Adam Schlagman

In 2017, Atlanta attorney Bess Hinson founded the Atlanta Women in Cybersecurity Roundtable, an invitation-only initiative to provide community and resources to advance women in cybersecurity in Atlanta. Here, we speak with some of those women leaders about their biggest security and privacy challenges and why women are pursing legal and other roles in the cybersecurity and privacy field.

Features

Federal Data Privacy Legislation Is Likely Next Year, Tech Lawyers Say Image

Federal Data Privacy Legislation Is Likely Next Year, Tech Lawyers Say

Dan Clark

For Years, Federal Legislators Have Attempted to Pass Comprehensive Cybersecurity and Data Privacy Legislation. With More Support Than Ever from the Public, Industry and Both Sides of the Political Spectrum, 2019 May Be the Year When Such Legislation Is Enacted.

Features

Prepping a Mock Notification Letter Before a Cybersecurity Breach Hits Image

Prepping a Mock Notification Letter Before a Cybersecurity Breach Hits

Stephen Moore

Being prepared for the worst before it even happens can minimize the damage in the event of a cybersecurity incident. To get any company ready for a cybersecurity event, the first step is to organize a team to write a mock breach notification letter that will represent your message to the world about your failure in the event you have a breach.

Features

Risks in Online Collection of Children's Data Image

Risks in Online Collection of Children's Data

Jeffrey Higel, Michael Bahar & Mike Nelson

As convenient, useful and cool mobile technology and interconnected devices are, they come with risks that remain largely unseen or, worse, ignored. Some pose security risks and privacy risk, like those present in voice-activated devices — especially for children. For manufacturers, they also pose regulatory litigation and insurance risks, especially when children end up using their “smart” products.

Features

Sticking a Hand in the Internet Cookie Jar Image

Sticking a Hand in the Internet Cookie Jar

Jeffrey Higel, Michael Bahar & Mike Nelson

Why Collecting Children's Online Data is a Risk As convenient, useful and cool mobile technology and interconnected devices are, they come with risks that remain largely unseen or, worse, ignored. For manufacturers, they also pose regulatory litigation, and insurance risks, especially when children end up using their "smart" products.

Features

Are You Prepared? Dealing with GDPR-like Rules Spreading Across the Nation Image

Are You Prepared? Dealing with GDPR-like Rules Spreading Across the Nation

Mark Sangster

California's Consumer Privacy Act, signed into law earlier this year, follows a growing line of consumer privacy laws, such as the European General Data Protection Regulations (GDPR), Canadian Breach of Security Safeguards Regulations of the Personal Information Protection and Electronic Documents Act (PIPEDA), and related New York Department of Financial Services Cybersecurity Rules and Regulations (NYCRR 500).

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Right to Associate in the Defense
    The "right to associate" permits the insurer to work with the insured to investigate, defend, or settle a claim. Such partnerships protect the insurer and can prove beneficial to the insured's underlying case and ultimate exposure.
    Read More ›