Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

The Anatomy of a Cyberattack: Step-by-Step Image

The Anatomy of a Cyberattack: Step-by-Step

Mike Paul

This article looks at each stage of a cyberattack, by way of a fictitious attack that took over a real estate agent's email account.

Features

Cybersecurity Awareness Must Extend Beyond the 'Month' Image

Cybersecurity Awareness Must Extend Beyond the 'Month'

Emil Sayegh

For all of that is created and consumed during October's Cybersecurity Month, it is disappointing to see how each year after all the thoughts have been shared, major security incidents continue to emerge. We need to begin to take stock of all the advice given during this month and put it to immediate practice.

Features

The Roadmap of Litigation Analytics Image

The Roadmap of Litigation Analytics

Gloria Huang

Litigation analytics can be considered a roadmap of sorts — an important guide to ensure the legal professional arrives at the correct litigation strategy or business plan. However, like roadmaps, litigation analytics will only be useful if it's based on data that is complete and accurate.

Features

New State Statutes and Federal Guidelines Create Basket Weave of Cybersecurity Compliance Image

New State Statutes and Federal Guidelines Create Basket Weave of Cybersecurity Compliance

Kenya Parrish-Dixon

The U.S. doesn't have a federal cybersecurity law, but that doesn't mean there is no cybersecurity industry standard. There are regulations, case law, guidelines and state laws that, when combined, create an industry standard applicable to almost all business sectors.

Features

How to Fight Online Defamation Image

How to Fight Online Defamation

Doug Bania

Internet tools are becoming more sophisticated in measuring the impact of disparaging and defamatory online statements, paving the way for affected business owners and celebrities to fight back by filing defamation suits seeking to recover damages for the harm to their reputation and brand value.

Features

Ransomware Insurance: Understanding the Developing Legal & Regulatory Landscape Image

Ransomware Insurance: Understanding the Developing Legal & Regulatory Landscape

J. Andrew Moss, David M. Cummings & Jessica E. Gopiao

In light of the ever-growing ransomware threat, it is important to understand the developing legal and regulatory landscape in order to take the proper steps at the first sign of an attack, including getting the insurance company involved immediately.

Features

21st Century Data Dumps and the 'Brady' Rule Image

21st Century Data Dumps and the 'Brady' Rule

Peter A. Crusco

What are the document dump rules that apply today? And how does the Brady rule apply to this evolving area of criminal practice? This article will address these issues.

Features

Legal Tech: The Secret Life of E-Discovery Funding Image

Legal Tech: The Secret Life of E-Discovery Funding

Victoria Hudgins

The true extent of funding amounts fueling legal tech and e-discovery software companies will likely never be widely shared. The reason is simple: Without regulatory requirements, the competitive risks of disclosing these investments regularly outweighs any potential benefits.

Features

How Disney's Motion to Compel Arbitration of Scarlett Johansson's Lawsuit Over 'Day-and-Date' Release of Black Widow Movie Might Have Played Out Image

How Disney's Motion to Compel Arbitration of Scarlett Johansson's Lawsuit Over 'Day-and-Date' Release of Black Widow Movie Might Have Played Out

Stan Soocher

Johansson alleges that, in order to generate new subscribers for Disney+, Disney intentionally interfered with her talent agreement with Disney affiliate Marvel Studios for her featured role in Black Widow — and thus allegedly induced Marvel to breach a promise in the Johansson/Marvel agreement for the film to be initially distributed in exclusive "wide theatrical release." Updated Oct. 1 to reflect a confidential settlement reached in the case.

Features

Electronic Discovery Document Review: The Power of Feedback Image

Electronic Discovery Document Review: The Power of Feedback

Maggie Burtoft 

Human review of documents will continue to play a huge part in the ediscovery process. Managing reviewer training and accuracy can make or break the budget for your matter.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The 'Sophisticated Insured' Defense
    A majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.
    Read More ›
  • Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric Code
    In an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.
    Read More ›