Features
CT Court System Has Put GAL Training Sessions on Hold
Connecticut attorneys who would like to add guardian ad litem work to their practices need to undergo training first, but the state hasn't offered it in over two years and no new training sessions are scheduled.
Features
Equity Crowdfunding
There has been a great deal of media attention the past several years about the JOBS Act. It has various components that do various things. The aspect of the JOBS Act that has the potential to touch the largest number of Americans is Title III (Crowdfunding).
Features
Mobile Medical Apps and Product Liability
As mobile medical apps become central to medical care, litigation is inevitable. A threshold issue in such litigation is likely to be whether or not a mobile app is, in the first instance, subject to FDA regulation.
Columns & Departments
Verdicts
Hospital Remains in Suit After Court Finds Ostensible Agency <br>NY Appeals Court Finds Physicians May Opine As to Proximate Cause in Cases Involving Claims Outside Own Specialty
Features
10 Lessons from FTC Guidance on Data Security
Not if, but when." These simple words are enough to keep privacy officers, corporate counsel, compliance officers and IT managers up at night when faced with the reality that their network will at some point be breached. While there are no silver bullets to stop breaches from occurring, understanding and following legal actions brought by regulatory agencies and heeding security guidance they issue can go a long way.
Features
Information Sharing for the Information Age
As 2015 drew to a close, Congress agreed on a federal budget. That simple act, coming on the heels of a series of contentious continuing resolutions, was big news. But tucked away on page 694 of that 887-page bill was perhaps a more significant achievement. There Congress inserted, passed, and the President signed, the Cybersecurity Act of 2015.
Features
CFPB Takes Step Into Cybersecurity Regulation
The Consumer Financial Protection Bureau (CFPB) has fired a shot across the bow of the burgeoning online-payment industry, taking an enforcement action this week that marked the agency's first foray into regulating cybersecurity.
Features
<b><i>Online Extra:</b></i> Malware Increasingly Making Its Way into Organizations Through Social Media
To say 'social media is everywhere' these days may be slightly archaic. Of course it's everywhere. Chances are, you're reading this article with at least one social media application running or open in a browser right now. But why, then, aren't these social media platforms as secure as they could be? A new 'Best Practices for Social Media Archiving and Security' survey from Osterman Research found that although enterprise and consumer-focused social platforms abound in modern organizations, social media remains a threat for many companies.
Features
<b><i>Online Extra:</b></i> Separating Truth from Lies: Website Tips for Small and Mid-Sized Firms
Experts at the 'Truth and Lies of the Internet for Lawyers' panel at ABA Tech Show 2016 in Chicago conducted the one hour discussion in a way similar to the TV show 'Mythbusters' ' dispelling some of the common myths told to small and mid-sized firms looking to build their own business.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Understanding the Potential Pitfalls Arising From Participation in Standards BodiesChances are that if your company is involved in research and development of new technology there is a standards setting organization exploring the potential standardization of such technology. While there are clear benefits to participation in standards organizations — keeping abreast of industry developments, targeting product development toward standard compliant products, steering research and intellectual property protection into potential areas of future standardization — such participation does not come without certain risks. Whether you are in-house counsel or outside counsel, you may be called upon to advise participants in standard-setting bodies about intellectual property issues or to participate yourself. You may also be asked to review patent policy of the standard-setting body that sets forth the disclosure and notification requirements with respect to patents for that organization. Here are some potential patent pitfalls that can catch the unwary off-guard.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
