Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


Protecting Your Company's Data from Security Breaches
This article explores some steps counsel can take to protect their organizations from a data breach, and how counsel can proactively help to mitigate any adverse impact in the unfortunate event a data breach occurs.
The Art of Cyberwarfare
Cybersecurity is at a crossroads. No longer resigned to the confines of server rooms overseen by information technology, decisions regarding the protection of data have been forced into the boardroom by events that include breaches at main street businesses and revelations of clandestine government hacking activities.
Attacking the Electronic Medical Record
The electronic age has paved the way for speedy retrieval of medical records. But the problem is that the electronic record is only as good as the individuals who input the information into the record itself.
Data Sharing In the Cloud
Storing and sharing data "in the cloud" has become, in many instances, a business necessity. The practical and economic advantages of cloud computing are clear ' it eliminates the need to send client data via traditional, costly methods, and is significantly less expensive than building and maintaining the same data storage capacity in-house.
Court Watch
Franchisees and Dealers Should Plead Causation In Actions Against the Government <br>Michigan Court Transfers Case Brought By 41 Franchisees to Franchisor's Home State
How to Fix Reputational Harm
The speed with which negative Internet postings spread can cause immediate reputational harm. To remedy this harm, the nature and extent of the damage must be quantified, which is no easy task. However, new digital tools can now be used to assess and quantify damage caused by these kinds of negative Internet postings.
Managing Security Risks During Labor Disputes
Every company with union workers faces the risk of a labor dispute. Identifying any business risks and then managing them is a priority for executive decision-makers who must ensure that the company delivers its promises to stockholders, customers and employees. The process is well defined in business terms:
The Ethical Duty to Be Competent in Technology and eDiscovery
Lawyers understand that they have an ethical duty to remain competent in the law and its practice. But far fewer are aware that an emerging body of legal-ethics rules and opinions say that lawyers also have a duty to be competent in relevant technology.
<b><i>Online Extra:</b></i> NJ Legislature Moves on Cybersecurity Bill
The New Jersey Legislature on Oct. 5 began taking steps toward increasing its ability to combat cybercrime.
<b><i>Online Extra:</b></i> Google, Microsoft Strike Patent Peace Deal
Microsoft Corp. and Google Inc. have buried the hatchet on five years of patent litigation.The companies issued a joint statement on Sept. 30 announcing the conclusion of 20 cases being litigated in the United States and Europe. The agreement comes a week after a U.S. Court of Appeals for the Ninth Circuit decision resolving one of their most prominent disputes.

MOST POPULAR STORIES