Cybersecurity Legal Strategies
For good reason, cybersecurity has become a vital risk-management concern, and legal-based strategies, procedures and controls are essential parts of today's all-encompassing cybersecurity risk-management programs. <br>It seems a given. <br>Unfortunately, although many companies have written preparedness and cyberattack-defense plans, many have overlooked crafting the shielding armor of a well constructed legal layer. <br>And that's a big mistake waiting to happen ' again and again.
You Won't Drink To This
Buying wine over the Internet is legal, but selling wine on the Net has its problems and, as a result, there are few resounding cheers in the United States regarding e-sales of wine. <br>Here's how cork flecks get in the vintage: state authorities ' saying that they're protecting consumers ' exploit state regulations to thwart Internet sales of various goods and services, and wine is no exception.
Don't Let An Ex-Employee Sabotage Your Case
With the instability in the corporate world today, employees ' both managerial and not ' are changing jobs or being laid off routinely. The employee who spends his entire career with one company is clearly now the exception, not the rule. Gone too is the concept of "loyalty up ' loyalty down." Corporations today can no longer afford to show their appreciation to long-term employees, as was the case a generation ago. In return, corporate employees do not reciprocate the same loyalty as they did in years past. This article discusses some strategies for dealing with the possibility of a hostile former employee sabotaging your otherwise valid claim or defense.
Cybervillains and How to Find Them: Obtaining the Identity of Anonymous Internet Users
Many corporate executives and in-house attorneys have complained about acts done "anonymously" over the Internet and the lack of accountability for Internet users. Each has seemingly been harmed by various online conduct, such as defamation, trade libel, trade secret leakage and other acts that occur because of Internet use and abuse. Many Internet users do not realize that an experienced lawyer can actually find their identity, location, and the situs of the damaging action(s).
<i>Zubulake</i> Standard Applied in <i>U.S. v. Phillip Morris</i>
When a lawsuit looms, corporate counsel have traditionally known what to do. They issue a litigation hold, telling company employees to maintain all records related to the disputed matter. <br>Unfortunately, that's not good enough any more. Attorneys can no longer simply issue instructions and leave it up to company employees to comply. <br>Two recent federal court rulings hold companies and their counsel to a higher standard, requiring them to act aggressively and proactively in order to preserve company records. Otherwise, a company that destroys discoverable records can face harsh sanctions for spoliation.
Compensation: Is <i>Not</i> Tracking Contributions a Good Idea?
Joel Rose authored last month's <i>A&FP</i> article on how to balance compensation for law firm partners whose strengths lay in origination, production and management. So <i>A&FP</i> sought his reaction to the following thought-provoking quote from Peter C. Lando and Matthew B. Lowrie.