Features

Equifax Breach Will Fuel Identity Theft Remediation Debate
In the wake of suits filed against Equifax by consumers, businesses and governmental units, courts will have to grapple with the question of what remedies are appropriate. These issues are not unique to the Equifax incident, but the scope of the breach will undoubtedly lead to more debate than ever before.
Features

The Myth of the Secure Cloud
“There's really no such thing as the cloud, there are only other people's computers.” This may have been true at first; but it is now worth some investigation if the present threat environment today demands a secure cloud.
Features

The Myth of the Secure Cloud
"There's really no such thing as the cloud, there are only other people's computers." This may have been true at first; but it is now worth some investigation if the present threat environment today demands a secure cloud.
Features

The Equifax Breach: Why This One Is Different
This is not the first time that a credit reporting agency has been breached, nor is it the first time that Equifax has reported a breach. What <i>is</i> different with the current breach is its size and the nature of information compromised, as well as the implications of the breach in light of the increasingly complex web of cybersecurity regulations nationwide.
Features

5 Things to Know About the First Wave of Equifax Actions
With 143 million people potentially hit by Equifax Inc.'s data breach, there's no doubt there will lawsuits — a lot of them."You'll have suits in…
Features

Big Data, Web 'Scraping' and Competition Law
<b><i>The Debate Continues</i></b><p>Web "scraping" is one method of accumulating data that has sparked recent legal debate, both antitrust and otherwise. Legal challenges to Web scraping have involved privacy claims and claims under the federal Computer Fraud and Abuse Act, in addition to antitrust claims about the need to collect public data to be able to compete freely.
Features

There May Be 'No Do-Overs,' but SEC Hack Provides Important Security Lessons
Even the Securities and Exchange Commission (SEC) can get hacked — and the recently announced cyber attack against the SEC is providing an important wake-up call for U.S. companies regulated by the powerful agency and the attorneys they work with.
Features

New Sources of Discoverable Evidence
<b><I>Part One of a Two-Part Article</I></b><p>Personal assistants, fitness trackers, and automotive black boxes are among the devices whose data and metadata may have big impact in legal cases. Here's why.
Features

Vendor Contracting for Privacy and Security
In an effort to continue to capture ongoing and new business, vendors may be opening themselves up to liability due to poorly drafted contracts with companies. In addition, in a rush by companies to have data shifted to the cloud, privacy concerns may be dangerously minimized.
Features

What's the Deal with WhatsApp?
<b><i>Investigating and Discovering Mobile Device Data</b></i><p>Analyzing data from mobile devices is still uncharted territory for many in Legal and IT. Accordingly, today's modern legal and technology professionals need to brush-up on all things mobile. This includes understanding where applicable data resides in a mobile device and what common challenges are associated with accessing, preserving and extracting this data. One such app taking the mobile device world by storm is WhatsApp.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- "Holy Fair Use, Batman": Copyright, Fair Use and the Dark KnightThe copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.Read More ›