Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Regulation

Features

Privacy and Security of Personal Information Collected by Benefit Plans Image

Privacy and Security of Personal Information Collected by Benefit Plans

Marc Bussone

High profile cyberattacks and data breaches have become routine occurrences. Cyber threats are so pervasive that many privacy and security experts advise that responsible parties ' like fiduciaries of employee benefit plans ' should prepare for <i>when</i> a data breach occurs, not </i>if</i>. Plan sponsors and fiduciaries should be aware of, and address, security and privacy issues in connection with personal information.

Features

Quarterly State Compliance Review Image

Quarterly State Compliance Review

Sandra Feldman

This edition of the Quarterly State Compliance Review looks at some legislation of interest to corporate lawyers that went into effect between Aug. 1 and Oct. 1, 2016, including amendments to Delaware's corporation and LLC laws. It also looks at some recent cases of interest, including two decisions from the Delaware Chancery Court.

Features

Social Media Influencers and the FTC Image

Social Media Influencers and the FTC

Thomas Harvey

Brand owners and their attorneys are grappling with an important question: How to disclose their connections to luminaries like PewDiePie.

Features

Intern Lawsuits Move to State Court; Face Class Decertification, Labor Test Uncertainties Image

Intern Lawsuits Move to State Court; Face Class Decertification, Labor Test Uncertainties

Jason Grant

The cases left on the docket feature a glitzy list of Manhattan-based fashion and media defendants ' Dolce &amp; Gabbana, Ralph Lauren, Giorgio Armani, CBS, Simon &amp; Schuster and many others. More than 40 "active" lawsuits in all, claiming that the companies' unpaid internship programs violated employment laws.

Features

Law Firms Facing Unprecedented Cyber Risk Image

Law Firms Facing Unprecedented Cyber Risk

Mark Sangster

For years, various government authorities and security experts warned the legal industry about the proverbial cyber target painted on their chest. And while a cornucopian crop of headlines bloomed about data breaches, most concentrated on major retailers or recognizable brands. Given nebulous reporting legislations, the data breaches at law firms remained below the press horizon. But you can only dodge so many bullets until one hits the industry square in the chest.

Features

<b><i>Online Extra:</b></i> Much Ado About 'Minimum Standards' for DFS Cybersecurity Regulation Image

<b><i>Online Extra:</b></i> Much Ado About 'Minimum Standards' for DFS Cybersecurity Regulation

Chris Stecher & Justin Hectus

The New York State Department of Financial Services (DFS) made headlines on by announcing a 'first-in-the-nation,' comprehensive cybersecurity regulation, which will mandate 16 'minimum standards' for the 4,000+ institutions operating under DFS jurisdiction. The regulation was released on Sept. 28.

Features

<b><i>Breaking News:</b></i> Much Ado About 'Minimum Standards' for DFS Cybersecurity Regulation Image

<b><i>Breaking News:</b></i> Much Ado About 'Minimum Standards' for DFS Cybersecurity Regulation

Chris Stecher & Justin Hectus

The New York State Department of Financial Services (DFS) made headlines on by announcing a 'first-in-the-nation,' comprehensive cybersecurity regulation, which will mandate 16 'minimum standards' for the 4,000+ institutions operating under DFS jurisdiction. The regulation was released on Sept. 28.

Features

<b><i>Online Extra:</b></i> British Billionaire's Suit Over Alleged Leak Offers First Test of Privacy Law Image

<b><i>Online Extra:</b></i> British Billionaire's Suit Over Alleged Leak Offers First Test of Privacy Law

Zoe Tillman

Gilbert Chagoury, a British billionaire and philanthropist was denied a visa last year to enter the United States because, according to the U.S. government, he was suspected of supporting terrorism. Chagoury denies the allegation, saying the U.S. Department of State relied on bad intelligence. And now he's suing federal agencies that he claims leaked information about him to a reporter. His suit is thought to be the first case brought under the Judicial Redress Act, which President Barack Obama signed in February.

Columns & Departments

<b><i>e-Discovery Tech:</b></i> Why the FRCP Amendments Mean Legal Teams Need Technology Now More Than Ever Image

<b><i>e-Discovery Tech:</b></i> Why the FRCP Amendments Mean Legal Teams Need Technology Now More Than Ever

Nancy Patton

Across organizations, a similar process (more or less) is followed when conducting e-discovery, but the steps often happen in quick succession or nearly simultaneously. The steps are loosely defined by the FRCP and the judicial interpretation that flows from them. The recent changes to the FRCP will inevitably result in the steps shifting and evolving in the coming months and years.

Features

Is Your Printer A Gateway For Hackers? Five Tips for a Secure Printer Image

Is Your Printer A Gateway For Hackers? Five Tips for a Secure Printer

Mark Gerlach

Printers can contain sensitive information, or can be an entry point for hackers. It's imperative that law firms shield printers against hackers.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategic Uses of a Rule 2004 Exam
    While most bankruptcy practitioners are familiar with the basic concepts behind the Rule 2004 exam, some are less familiar with the procedural intricacies of obtaining, conducting, and responding to the exam ' intricacies that often involve practices and procedures adapted from civil discovery that are beyond the scope of pure bankruptcy practice. This article explains.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›