Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Fantasy Sports Dispute Results in New Views On Exceptions to Rights of Publicity Image

Fantasy Sports Dispute Results in New Views On Exceptions to Rights of Publicity

Stan Soocher

The big news in the fantasy sports arena this past summer was the announcement that competitors FanDuel and DraftKings, which make up more than 90% of the online market, would end their merger bid following the Federal Trade Commission's filing of an antitrust lawsuit against the companies. Now, there's good news for FanDuel and DraftKings on a different front, involving the use of athletes' personality components.

Features

Social Media: Questions of Admissibility and Ethics Image

Social Media: Questions of Admissibility and Ethics

Khizar A. Sheikh, Lynne Strober & Jennifer Presti

<b><i>Part One of a Two-Part Article</i></b><p>This two-part article is divided into three sections: 1) Social media, defined; 2) Examples of how social media has been used in family law cases; and 3) Ethical considerations for attorneys who gather social media evidence.

Features

The Privacy Shield Scheme: Should Your Company Join? Image

The Privacy Shield Scheme: Should Your Company Join?

Jonathan Armstrong & André Bywater

The purpose of this article is to shed some light on the EU-US Privacy Shield for business. This is vital in order to enable businesses to make an informed decision on whether or not to join this scheme.

Features

New Sources of Discoverable Evidence Image

New Sources of Discoverable Evidence

Michael Ciaramitaro

<b><i>Part Two of a Two-Part Article</i></b><p>Last month, the author discussed some of the technologies people are using today, such as fitness trackers and intelligent personal assistants, and the e-discovery implications they entail. Like these, automotive "Black Boxes" and drones could yield important information for those seeking evidence in a legal action.

Features

Data Security and Data Breach Response Continue to Be a Hot Issue Image

Data Security and Data Breach Response Continue to Be a Hot Issue

Kevin Coy

<b><i>Lessons from 2017 Enforcement Actions and Guidance</b></i><p>Regulators including the FTC, the Department of Health and Human Services Office of Civil Rights (OCR) — the agency responsible for enforcing the HIPAA rules for protected health information (PHI) — and state attorneys general have issued guidance and announced a number of settlements in data security cases that are instructive about measures that organizations can take to reduce the potential for a data breach or, if a breach does occur, provide appropriate notice.

Features

Security First Approach Provides a Significant Advantage to Law Firms Image

Security First Approach Provides a Significant Advantage to Law Firms

Mark Sangster

The security industry all too often sells the next shiny object touted as the Holy Grail of security that protects against all cyber threats. And the following year, the next best thing hits the market and becomes the grail until proven fallible.

Features

Equifax Breach Will Fuel Identity Theft Remediation Debate Image

Equifax Breach Will Fuel Identity Theft Remediation Debate

Angela R. Matney

In the wake of suits filed against Equifax by consumers, businesses and governmental units, courts will have to grapple with the question of what remedies are appropriate. These issues are not unique to the Equifax incident, but the scope of the breach will undoubtedly lead to more debate than ever before.

Features

The Myth of the Secure Cloud Image

The Myth of the Secure Cloud

Nina Cunningham

“There's really no such thing as the cloud, there are only other people's computers.” This may have been true at first; but it is now worth some investigation if the present threat environment today demands a secure cloud.

Features

The Myth of the Secure Cloud Image

The Myth of the Secure Cloud

Nina Cunningham

"There's really no such thing as the cloud, there are only other people's computers." This may have been true at first; but it is now worth some investigation if the present threat environment today demands a secure cloud.

Features

The Equifax Breach: Why This One Is Different Image

The Equifax Breach: Why This One Is Different

F. Paul Greene

This is not the first time that a credit reporting agency has been breached, nor is it the first time that Equifax has reported a breach. What <i>is</i> different with the current breach is its size and the nature of information compromised, as well as the implications of the breach in light of the increasingly complex web of cybersecurity regulations nationwide.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Navigating the Attorney-Client Privilege and Work Product Doctrine in Bankruptcy
    When a company declares bankruptcy, avoidance actions under Chapter 5 of the Bankruptcy Code can assist in securing extra cash for the debtor's dwindling estate. When a debtor-in-possession does not pursue these claims, creditors' committees often seek the bankruptcy court's authorization to pursue them on behalf of the estate. Once granted such authorization through a “standing order,” a creditors' committee is said to “stand in the debtor's shoes” because it has permission to litigate certain claims belonging to the debtor that arose before bankruptcy. However, for parties whose cases advance to discovery, such a standing order may cause issues by leaving undecided the allocation of attorney-client privilege and work product protection between the debtor and committee.
    Read More ›