Features

Privacy and Security of Personal Information Collected by Benefit Plans
High profile cyberattacks and data breaches have become routine occurrences. Cyber threats are so pervasive that many privacy and security experts advise that responsible parties ' like fiduciaries of employee benefit plans ' should prepare for <i>when</i> a data breach occurs, not </i>if</i>. Plan sponsors and fiduciaries should be aware of, and address, security and privacy issues in connection with personal information.
Features

Quarterly State Compliance Review
This edition of the Quarterly State Compliance Review looks at some legislation of interest to corporate lawyers that went into effect between Aug. 1 and Oct. 1, 2016, including amendments to Delaware's corporation and LLC laws. It also looks at some recent cases of interest, including two decisions from the Delaware Chancery Court.
Features

Social Media Influencers and the FTC
Brand owners and their attorneys are grappling with an important question: How to disclose their connections to luminaries like PewDiePie.
Features

Intern Lawsuits Move to State Court; Face Class Decertification, Labor Test Uncertainties
The cases left on the docket feature a glitzy list of Manhattan-based fashion and media defendants ' Dolce & Gabbana, Ralph Lauren, Giorgio Armani, CBS, Simon & Schuster and many others. More than 40 "active" lawsuits in all, claiming that the companies' unpaid internship programs violated employment laws.
Features

Law Firms Facing Unprecedented Cyber Risk
For years, various government authorities and security experts warned the legal industry about the proverbial cyber target painted on their chest. And while a cornucopian crop of headlines bloomed about data breaches, most concentrated on major retailers or recognizable brands. Given nebulous reporting legislations, the data breaches at law firms remained below the press horizon. But you can only dodge so many bullets until one hits the industry square in the chest.
Features
<b><i>Online Extra:</b></i> Much Ado About 'Minimum Standards' for DFS Cybersecurity Regulation
The New York State Department of Financial Services (DFS) made headlines on by announcing a 'first-in-the-nation,' comprehensive cybersecurity regulation, which will mandate 16 'minimum standards' for the 4,000+ institutions operating under DFS jurisdiction. The regulation was released on Sept. 28.
Features
<b><i>Breaking News:</b></i> Much Ado About 'Minimum Standards' for DFS Cybersecurity Regulation
The New York State Department of Financial Services (DFS) made headlines on by announcing a 'first-in-the-nation,' comprehensive cybersecurity regulation, which will mandate 16 'minimum standards' for the 4,000+ institutions operating under DFS jurisdiction. The regulation was released on Sept. 28.
Features
<b><i>Online Extra:</b></i> British Billionaire's Suit Over Alleged Leak Offers First Test of Privacy Law
Gilbert Chagoury, a British billionaire and philanthropist was denied a visa last year to enter the United States because, according to the U.S. government, he was suspected of supporting terrorism. Chagoury denies the allegation, saying the U.S. Department of State relied on bad intelligence. And now he's suing federal agencies that he claims leaked information about him to a reporter. His suit is thought to be the first case brought under the Judicial Redress Act, which President Barack Obama signed in February.
Columns & Departments
<b><i>e-Discovery Tech:</b></i> Why the FRCP Amendments Mean Legal Teams Need Technology Now More Than Ever
Across organizations, a similar process (more or less) is followed when conducting e-discovery, but the steps often happen in quick succession or nearly simultaneously. The steps are loosely defined by the FRCP and the judicial interpretation that flows from them. The recent changes to the FRCP will inevitably result in the steps shifting and evolving in the coming months and years.
Features
Is Your Printer A Gateway For Hackers? Five Tips for a Secure Printer
Printers can contain sensitive information, or can be an entry point for hackers. It's imperative that law firms shield printers against hackers.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Legal Possession: What Does It Mean?Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.Read More ›
- Players On the MoveA look at moves among attorneys, law firms, companies and other players in entertainment law.Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›