Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Regulation

Features

10 Lessons from FTC Guidance on Data Security Image

10 Lessons from FTC Guidance on Data Security

Marc S. Roth

Not if, but when." These simple words are enough to keep privacy officers, corporate counsel, compliance officers and IT managers up at night when faced with the reality that their network will at some point be breached. While there are no silver bullets to stop breaches from occurring, understanding and following legal actions brought by regulatory agencies and heeding security guidance they issue can go a long way.

Features

Information Sharing for the Information Age Image

Information Sharing for the Information Age

David Burg, Sean Joyce & Michael L. Bloom

As 2015 drew to a close, Congress agreed on a federal budget. That simple act, coming on the heels of a series of contentious continuing resolutions, was big news. But tucked away on page 694 of that 887-page bill was perhaps a more significant achievement. There Congress inserted, passed, and the President signed, the Cybersecurity Act of 2015.

Features

CFPB Takes Step Into Cybersecurity Regulation Image

CFPB Takes Step Into Cybersecurity Regulation

C. Ryan Barber

The Consumer Financial Protection Bureau (CFPB) has fired a shot across the bow of the burgeoning online-payment industry, taking an enforcement action this week that marked the agency's first foray into regulating cybersecurity.

Features

<b><i>Online Extra:</b></i> Malware Increasingly Making Its Way into Organizations Through Social Media Image

<b><i>Online Extra:</b></i> Malware Increasingly Making Its Way into Organizations Through Social Media

Zach Warren

To say 'social media is everywhere' these days may be slightly archaic. Of course it's everywhere. Chances are, you're reading this article with at least one social media application running or open in a browser right now. But why, then, aren't these social media platforms as secure as they could be? A new 'Best Practices for Social Media Archiving and Security' survey from Osterman Research found that although enterprise and consumer-focused social platforms abound in modern organizations, social media remains a threat for many companies.

Features

<b><i>Online Extra:</b></i> Separating Truth from Lies: Website Tips for Small and Mid-Sized Firms Image

<b><i>Online Extra:</b></i> Separating Truth from Lies: Website Tips for Small and Mid-Sized Firms

Zach Warren

Experts at the 'Truth and Lies of the Internet for Lawyers' panel at ABA Tech Show 2016 in Chicago conducted the one hour discussion in a way similar to the TV show 'Mythbusters' ' dispelling some of the common myths told to small and mid-sized firms looking to build their own business.

Features

<b><i>Online Extra:</b></i> Home Depot to Pay $13 Million to Settle Consumers' Data Breach Case Image

<b><i>Online Extra:</b></i> Home Depot to Pay $13 Million to Settle Consumers' Data Breach Case

R. Robin McDonald

The Home Depot will pay $13 million to resolve claims by customers whose personal information was exposed to hackers during a massive data security breach in 2014. The settlement agreement, filed in March in U.S. District Court in Atlanta, would certify a class of Home Depot customers to include all U.S. residents whose personal information was compromised after they used payment cards at self-checkout lanes at U.S. Home Depot stores between April 10, 2014, and Sept.'

Features

<b><i>Online Extra:</b></i> Chipotle in Trouble Again, This Time With the NLRB Image

<b><i>Online Extra:</b></i> Chipotle in Trouble Again, This Time With the NLRB

Rebekah Mintzer

It hasn't been an easy couple of months for Denver-based fast casual food giant Chipotle Mexican Grill Inc. And now a decision from the National Labor Relations Board has shone a negative light on the company's social media policies and labor practices too.

Features

Top Security Intrusion Trends the Legal Community Should Watch Image

Top Security Intrusion Trends the Legal Community Should Watch

Steven Chabinsky

Lawyers are increasingly expected to understand the implications of cybersecurity when providing advice relating to a long list of matters that include privacy compliance, contract compliance, data breach response, data breach litigation, M&amp;A due diligence, and insurance coverage. As a result, it is important that lawyers understand the latest trends in cyber intrusions that may expose their stakeholders to unwarranted risk and allow adversaries to exploit technical and human vulnerabilities.

Features

Cost Recovery in 2016 Image

Cost Recovery in 2016

Robert C. Mattern

2016 is in full swing and we will soon be conducting the 2016 Mattern &amp; Associates Cost Recovery Survey. We've been conducting this bi-annual survey since 2004 and, during that time, it has become an industry resource for tracking the cost recovery practices of law firms across size and geography.

Features

The Disparate Impact of Hiring Practices Image

The Disparate Impact of Hiring Practices

Matthew R. Simpson

In a first-of-its-kind decision, the U.S. Court of Appeals for the Eleventh Circuit deferred to the EEOC and held that job applicants may bring "disparate impact" claims for age discrimination against potential employers, even in the absence of evidence of intentional discrimination.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Legal Possession: What Does It Mean?
    Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Cutting Off the Stream: How United States v. Silver Affects "Stream of Benefits" or "Retainer" Bribery
    Although the court stressed that, by vacating certain of former NY State Assembly Speaker Sheldon Silver's counts of conviction, it was clarifying and not altering the "as opportunities arise" theory, it nevertheless emphasized that this theory requires particularity with respect to the "question or matter" that is the subject of the bribe payor and recipient's corrupt agreement.
    Read More ›