Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Regulation

Features

A Six-Step Data Privacy Program Health Check Image

A Six-Step Data Privacy Program Health Check

Kristoph Gustovich

Data protection is the responsibility of every individual in the company, and the legal and IT departments should only be drafting contractual languages, policies, and guidelines while working in tandem with each other.

Features

Three Lessons for a Proactive Approach To Cybersecurity Image

Three Lessons for a Proactive Approach To Cybersecurity

Jason Straight

Do you know where your client's or organization's data is? It's not a rhetorical question ' it's a serious issue that should be at the core of any cybersecurity assessment.

Features

Sensitive Data Loss is Not Inevitable Image

Sensitive Data Loss is Not Inevitable

Mark Stevens

Global banking institutions are increasingly pressing outside law firms to demonstrate they are employing top-tier technologies to defend against cyber hackers. In some cases, firms are being asked to fill out 60-page questionnaires detailing their cybersecurity measures in minute detail, while others must consent to on-site inspections.

Features

Physician-Assisted Suicide Image

Physician-Assisted Suicide

Michael D. Brophy

On Feb. 6, 2015, the Supreme Court of Canada issued a landmark ruling, overturning precedent only two decades after it held that Canadian citizens have the right to end their lives, but if done with the assistance of a physician, that physician could be held liable. This highly anticipated decision is expected to encourage the efforts of right-to-die advocates in the United States and abroad.

Features

Patent Reform Bills Target Patent Trolls Image

Patent Reform Bills Target Patent Trolls

Joseph M. Kuo

On Sept. 16, 2011, the America Invents Act became effective, including provisions directed at non-practicing entities, commonly known as "patent trolls." Many believe, however, that patent trolls are still a plague, and that more must be done to curtail abusive patent litigation. This has led to the introduction of several patent reform bills.

Features

e-Discovery In An Information Governance World Image

e-Discovery In An Information Governance World

Marta Farensbach

Electronic discovery experts continue to put an emphasis on recognizing e-discovery as part of a complete information governance (IG) solution. Yet, despite its ubiquity, many professionals who have a solid grounding in electronic discovery struggle to understand how it falls into the broader world of information governance.

Features

Quarterly State Compliance Review Image

Quarterly State Compliance Review

Sandra Feldman

This edition of the Quarterly State Compliance Review looks at some legislation of interest to corporate lawyers that went into effect between Jan. 1, 2015 and April 1, 2015. It also looks at some recent decisions of interest from the courts of Delaware, Georgia and Maryland.

Features

Defining the Intersection of Legal and GRC Image

Defining the Intersection of Legal and GRC

Daniel de Juan

While the convergence of legal management and enterprise governance, risk, and compliance (GRC) is not new, more recent efforts to manage this development through integrated technology are fast becoming a strategic imperative.

Features

Keeping Government Environmental Investigations Civil Image

Keeping Government Environmental Investigations Civil

Ronald H. Levine & Michael Gross

The threat of criminal environmental prosecutions is real. Most federal and state environmental statutes provide for criminal prosecution in appropriate circumstances, often for knowing violations of environmental law, but sometimes even on a negligence or strict liability basis. Here's what you need to know.

Features

Digital Ubiquity and the Fourth Amendment Image

Digital Ubiquity and the Fourth Amendment

Richard Raysman & Peter Brown

Pick up pretty much any 21st century smart phone, tablet or PC, and in minutes, a treasure trove of information about its owner can be uncovered. Missives to a significant other, photos from summer vacation, browsing history that spans years; all of this information, generally considered of the most intimate nature, is easily accessible with even a rudimentary technical knowledge of the device's operating system. Needless to say, unwanted disclosure of such information can be highly damaging.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The FTC Gets Into the College Athlete NIL Game
    As national champions are crowned in men's and women's basketball, hundreds of thousands of college athletes are entering the influencer marketplace for the first time and now find themselves attractive candidates in the fast growing influencer marketing arena. With influencer marketing potentially providing a 5x return on investment, many brands are eager to get into the industry, but it doesn't come without risks as the FTC Commissioner is taking a closer look at the use of influencers for marketing.
    Read More ›