Features
CFPB Takes Step Into Cybersecurity Regulation
The Consumer Financial Protection Bureau (CFPB) has fired a shot across the bow of the burgeoning online-payment industry, taking an enforcement action this week that marked the agency's first foray into regulating cybersecurity.
Features
<b><i>Online Extra:</b></i> Malware Increasingly Making Its Way into Organizations Through Social Media
To say 'social media is everywhere' these days may be slightly archaic. Of course it's everywhere. Chances are, you're reading this article with at least one social media application running or open in a browser right now. But why, then, aren't these social media platforms as secure as they could be? A new 'Best Practices for Social Media Archiving and Security' survey from Osterman Research found that although enterprise and consumer-focused social platforms abound in modern organizations, social media remains a threat for many companies.
Features
<b><i>Online Extra:</b></i> Dozens of Big Firms Targeted by Hacker Seeking M&A Info
For several years law firms have been a key target for hackers seeking to obtain confidential information about initial public offerings, intellectual property and M&A deals, claim cybersecurity consultants, but rarely does word about specific attacks become public.On March 29, Crain's Chicago Business reported that 48 top firms, most of which appear in the Am Law 100 rankings, were targeted recently by a Russian hacker living in Ukraine seeking to trade on M&A information stolen from law firms.
Features
Top Security Intrusion Trends the Legal Community Should Watch
Lawyers are increasingly expected to understand the implications of cybersecurity when providing advice relating to a long list of matters that include privacy compliance, contract compliance, data breach response, data breach litigation, M&A due diligence, and insurance coverage. As a result, it is important that lawyers understand the latest trends in cyber intrusions that may expose their stakeholders to unwarranted risk and allow adversaries to exploit technical and human vulnerabilities.
Features
Internet Task Force Examines Copyright In the Digital Age
On Jan. 28, the Commerce Department issued a much-anticipated policy statement entitled "White Paper on Remixes, First Sale and Statutory Damages: Copyright Policy, Creativity, and Innovation in the Digital Economy." This article briefly describes the white paper's scope and recommendations, with a focus on the issue of statutory damages, as to which the white paper proposes several amendments to the current Copyright Act.
Features
Enterprise Legal Management
The function of legal departments has shifted from primarily managing legal matters and costs to acting as revenue generators that provide information and analytics valuable to the entire company. This article offers a primer about enterprise legal management (ELM).
Features
Privacy v. Data Security
The year 2005 really marked the beginning of the "era of data breaches," and with it, the "era of data breach lawsuits." In its place, what is now commonplace in the wake of major data breaches ' class action "privacy" litigation on behalf of data subjects, seeking millions of dollars in damages, under a dizzying array of legal theories.
Features
Cost Recovery in 2016
2016 is in full swing and we will soon be conducting the 2016 Mattern & Associates Cost Recovery Survey. We've been conducting this bi-annual survey since 2004 and, during that time, it has become an industry resource for tracking the cost recovery practices of law firms across size and geography.
Features
<b><i>Case Study</b></i>LAZINGA!: An Advanced Online Directory for Legal Professionals
My law firm is always looking for ways to simplify day-to-day processes. This includes having the most up-to-date software systems, streamlined and manageable billing systems, and the most cost effective ways to resource qualified temporary and permanent staffing.
Features
<b><i>Online Extra:</b></i> FDIC Chimes In on Cybersecurity
The Federal Deposit Insurance Corporation is the latest entity to release a framework for cybersecurity.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Second Circuit Rejects Arbitration of Debtor's Asserted Discharge ViolationA bankruptcy court properly denied a bank's motion to compel arbitration of a debtor's asserted violation of the court's discharge injunction, the U.S. Court of Appeals for the Second Circuit held.Read More ›
- Reining in the Inequitable Conduct DefenseResponding to views from the U.S. Patent and Trademark Office and elsewhere about the unintended consequences of the current inequitable conduct doctrine, a divided <i>en banc</i> Federal Circuit decision issued on May 25, 2011 adjusted the standard of the materiality element to make this defense harder to establish.Read More ›
- 'Customary Operations' or A Vacant Building?Many times, courts are faced with the question of whether a loss location is 'vacant' under a commercial property policy when trying to determine if the building owner or lessee is conducting customary operations. This article explores various decisions across the United States as to what is considered 'customary operations,' thereby rendering the property 'vacant.'Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- Judge Rules Shaquille O'Neal Will Face Securities Lawsuit for Promotion, Sale of NFTsA federal district court in Miami, FL, has ruled that former National Basketball Association star Shaquille O'Neal will have to face a lawsuit over his promotion of unregistered securities in the form of cryptocurrency tokens and that he was a "seller" of these unregistered securities.Read More ›