Features

The Myth of the Secure Cloud
“There's really no such thing as the cloud, there are only other people's computers.” This may have been true at first; but it is now worth some investigation if the present threat environment today demands a secure cloud.
Features

The Myth of the Secure Cloud
"There's really no such thing as the cloud, there are only other people's computers." This may have been true at first; but it is now worth some investigation if the present threat environment today demands a secure cloud.
Features

The Equifax Breach: Why This One Is Different
This is not the first time that a credit reporting agency has been breached, nor is it the first time that Equifax has reported a breach. What <i>is</i> different with the current breach is its size and the nature of information compromised, as well as the implications of the breach in light of the increasingly complex web of cybersecurity regulations nationwide.
Features

5 Things to Know About the First Wave of Equifax Actions
With 143 million people potentially hit by Equifax Inc.'s data breach, there's no doubt there will lawsuits — a lot of them."You'll have suits in…
Features

Big Data, Web 'Scraping' and Competition Law
<b><i>The Debate Continues</i></b><p>Web "scraping" is one method of accumulating data that has sparked recent legal debate, both antitrust and otherwise. Legal challenges to Web scraping have involved privacy claims and claims under the federal Computer Fraud and Abuse Act, in addition to antitrust claims about the need to collect public data to be able to compete freely.
Features

There May Be 'No Do-Overs,' but SEC Hack Provides Important Security Lessons
Even the Securities and Exchange Commission (SEC) can get hacked — and the recently announced cyber attack against the SEC is providing an important wake-up call for U.S. companies regulated by the powerful agency and the attorneys they work with.
Features

New Sources of Discoverable Evidence
<b><I>Part One of a Two-Part Article</I></b><p>Personal assistants, fitness trackers, and automotive black boxes are among the devices whose data and metadata may have big impact in legal cases. Here's why.
Features

Vendor Contracting for Privacy and Security
In an effort to continue to capture ongoing and new business, vendors may be opening themselves up to liability due to poorly drafted contracts with companies. In addition, in a rush by companies to have data shifted to the cloud, privacy concerns may be dangerously minimized.
Features

What's the Deal with WhatsApp?
<b><i>Investigating and Discovering Mobile Device Data</b></i><p>Analyzing data from mobile devices is still uncharted territory for many in Legal and IT. Accordingly, today's modern legal and technology professionals need to brush-up on all things mobile. This includes understanding where applicable data resides in a mobile device and what common challenges are associated with accessing, preserving and extracting this data. One such app taking the mobile device world by storm is WhatsApp.
Features

Industry Vendors Exploited Via Industry-Wide Cyber Attacks
<b><i>How to Protect Your Firm from Vendor Risks</b></i><p>The legal industry is still lulled into a false sense of security, mistakenly assuming that they are immune to a significant IT business outage, and that those unfortunate firms affected by cybercriminals were somehow lacking in adequate cybersecurity presages. That's simply not true. Even Achilles had a weak spot.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Leasing to a Foreign Entity Requires Special AttentionLeasing real property to a foreign entity presents a special set of concerns for landlords, and those who are leasing real property to a foreign entity should carefully evaluate these concerns ' and, where appropriate, address them in the lease. This article highlights the special considerations that a landlord encounters when leasing to a foreign entity.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Legal Possession: What Does It Mean?Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›