Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Regulation

Features

After Anthem, Diagnosing the Health of Data Security Image

After Anthem, Diagnosing the Health of Data Security

Rebekah Mintzer

Companies have begun to experience attempts to breach their databases on a frequent basis, and have had to become hypervigilant about protecting their networks against hackers. But once every couple of months, the bad guys get through the defense systems in a big and highly publicized way, showcasing data disaster for company and customers. This was the case in early February when Anthem Inc., the second-largest health insurance company in the U.S., announced it had been hacked.

Features

Parents May Be Liable for Child's Activity on Facebook Image

Parents May Be Liable for Child's Activity on Facebook

Jeffrey N. Rosenthal

It's 10 p.m. Do you know what your children are posting online?

Features

To Correct or Not Correct Misinformation in Social Media Image

To Correct or Not Correct Misinformation in Social Media

Alan G. Minsk

In June 2014, the FDA issued a draft guidance document on correcting independent third-party misinformation on social media. While the draft guidance is not legally binding, it offers insight on the implications of whether or not to correct misinformation.

Features

Commercial Lease Diligence Image

Commercial Lease Diligence

Jackie M. Burkhardt

This article reviews the recommended due diligence efforts of the purchaser's counsel with respect to leased commercial property, and elaborates on the pre- and post-closing rationales for completing such diligence review. The main focus of this article is the due diligence activities and rationale of counsel to a potential purchaser of all of the stock of a selling entity. Where relevant, it incorporates the alternate considerations that might arise in the context of an asset purchase or merger structure.

Features

Cybersecurity Practices Booming In Era of the Breach Image

Cybersecurity Practices Booming In Era of the Breach

Gina Passarella & David Gialanella

The cybersecurity woes of companies like Target and Sony in 2014 and Anthem last month have meant a busy start to 2015 for law firm data-privacy and security practices.

Features

<b><i>Online Extra</b></i> Suit Over Teacher's Anti-Gay Facebook Comments Can Proceed Image

<b><i>Online Extra</b></i> Suit Over Teacher's Anti-Gay Facebook Comments Can Proceed

Charles Toutant

A teacher in Union Township in Union County, NJ, who faced tenure charges over her anti-gay postings on Facebook can proceed with her civil rights suit against the school district, a federal judge in Newark has ruled.

Features

<b><i>Online Extra</b></i>FCC Approves Net Neutrality Proposal Image

<b><i>Online Extra</b></i>FCC Approves Net Neutrality Proposal

Ed Silverstein

By a 3-to-2 vote, the Federal Communications Commission on Feb. 26 approved a significant change in rules to promote 'net neutrality.'

Features

<b><i>Online Extra</b></i>$2.5M Verdict Awarded in First Phila. Risperdal Trial Image

<b><i>Online Extra</b></i>$2.5M Verdict Awarded in First Phila. Risperdal Trial

P.J. D'Annunzio

A Philadelphia jury on Feb. 24 awarded $2.5 million to the plaintiff in the first of roughly 1,250 Risperdal mass-tort cases in the city's courts.

Features

<b><i>Online Extra</b></i> FTC Stakes Claim As Data Security Cop Image

<b><i>Online Extra</b></i> FTC Stakes Claim As Data Security Cop

Jenna Greene

On the heels of an appellate win, the Federal Trade Commission on Jan. 23 reiterated its power to hold companies liable for data security breaches.

Features

<b><i>Online Extra</b></i> Turning Cybersecurity Into a Serious 'Game of Threats' Image

<b><i>Online Extra</b></i> Turning Cybersecurity Into a Serious 'Game of Threats'

Rebekah Mintzer

The last few years have seen some creative new methods of getting businesses engaged in protecting their networks and data. PricewaterhouseCoopers has created a cybersecurity computer game. PwC's 'Game of Threats' walks businesspeople, playing either as a team of nefarious hackers or as a company being attacked, through the important decisions they have to make during a breach, in hopes of giving them a deeper knowledge of cybersecurity and its challenges.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES