Features

Podcast: Phishing
Phishing is one of the more pervasive cyber attacks in the world, and while we've all received phishing emails, phishing attacks have become more sophisticated and come in different forms other than emails from Persian princes.
Features

What Lies Beneath the Surface: The Dark Web
This article provides a basic outline of the structure of the Web and some insight as to the purpose for and content housed on each level, as well as give some practical tips to avoid your company's data from ending up on the Dark Web.
Features

SCOTUS Takes Up Microsoft Case on Email Privacy
A long-running dispute between Microsoft and the Justice Department over providing the government with certain customer emails in criminal investigations will be refereed by the U.S. Supreme Court.
Features

Fantasy Sports Dispute Results in New Views On Exceptions to Rights of Publicity
The big news in the fantasy sports arena this past summer was the announcement that competitors FanDuel and DraftKings, which make up more than 90% of the online market, would end their merger bid following the Federal Trade Commission's filing of an antitrust lawsuit against the companies. Now, there's good news for FanDuel and DraftKings on a different front, involving the use of athletes' personality components.
Features

Social Media: Questions of Admissibility and Ethics
<b><i>Part One of a Two-Part Article</i></b><p>This two-part article is divided into three sections: 1) Social media, defined; 2) Examples of how social media has been used in family law cases; and 3) Ethical considerations for attorneys who gather social media evidence.
Features

The Privacy Shield Scheme: Should Your Company Join?
The purpose of this article is to shed some light on the EU-US Privacy Shield for business. This is vital in order to enable businesses to make an informed decision on whether or not to join this scheme.
Features

New Sources of Discoverable Evidence
<b><i>Part Two of a Two-Part Article</i></b><p>Last month, the author discussed some of the technologies people are using today, such as fitness trackers and intelligent personal assistants, and the e-discovery implications they entail. Like these, automotive "Black Boxes" and drones could yield important information for those seeking evidence in a legal action.
Features

Data Security and Data Breach Response Continue to Be a Hot Issue
<b><i>Lessons from 2017 Enforcement Actions and Guidance</b></i><p>Regulators including the FTC, the Department of Health and Human Services Office of Civil Rights (OCR) — the agency responsible for enforcing the HIPAA rules for protected health information (PHI) — and state attorneys general have issued guidance and announced a number of settlements in data security cases that are instructive about measures that organizations can take to reduce the potential for a data breach or, if a breach does occur, provide appropriate notice.
Features

Security First Approach Provides a Significant Advantage to Law Firms
The security industry all too often sells the next shiny object touted as the Holy Grail of security that protects against all cyber threats. And the following year, the next best thing hits the market and becomes the grail until proven fallible.
Features

Equifax Breach Will Fuel Identity Theft Remediation Debate
In the wake of suits filed against Equifax by consumers, businesses and governmental units, courts will have to grapple with the question of what remedies are appropriate. These issues are not unique to the Equifax incident, but the scope of the breach will undoubtedly lead to more debate than ever before.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Leasing to a Foreign Entity Requires Special AttentionLeasing real property to a foreign entity presents a special set of concerns for landlords, and those who are leasing real property to a foreign entity should carefully evaluate these concerns ' and, where appropriate, address them in the lease. This article highlights the special considerations that a landlord encounters when leasing to a foreign entity.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Legal Possession: What Does It Mean?Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›