Account

Sign in to access your account and subscription

Technology Media and Telecom

  • The Internet has generated a new set of assets known as "digital assets." Broadly defined, a digital asset is an electronic record in which an individual has a right or interest. This definition erroneously implies that digital assets should be treated as a legally equivalent set of assets when, in fact, failure to differentiate digital assets into one of three distinct classes will result in legal difficulties.

    November 02, 2017Jonathan Bick
  • This article provides a basic outline of the structure of the Web and some insight as to the purpose for and content housed on each level, as well as give some practical tips to avoid your company's data from ending up on the Dark Web.

    November 02, 2017Elizabeth Vandesteeg and Jeffrey Goldberg
  • A long-running dispute between Microsoft and the Justice Department over providing the government with certain customer emails in criminal investigations will be refereed by the U.S. Supreme Court.

    November 02, 2017Tony Mauro
  • New Nuix Cybersecurity Training and Certification Point to Pivot Not Only In Company But In Community At Large

    Getting certifications from Nuix is no longer just about mastery of its engine. With a new certification coming to market next quarter, Nuix, like many in the ESI and forensic space (namely Guidance Software, now OpenText), is shifting gears and driving directly into the race for cybersecurity supremacy in an evolving and currently fractured technology marketplace.

    November 02, 2017Jared Coseglia
  • As the adoption of cryptocurrencies — or digital currencies that are encrypted for security — spreads throughout the business and financial sectors, so too do the concerns that lack of regulation render the new-age currency susceptible to fraud, manipulation, and to being used as a vehicle for money laundering. Nevertheless, recent efforts by U.S. enforcement agencies to apply and enforce financial regulations indicate that cryptocurrency-based transactions will be under greater scrutiny than ever before.

    November 02, 2017Robert J. Anello and Christina Lee
  • The Often-Cited e-Discovery Guidelines Were 'Put Through the Ringer,' and the Result Is Updated Principles and Expanded Commentary for a New Technological Age

    Outside of guiding rules of evidence and procedure, the Sedona Principles are perhaps the most often-cited guidelines for handling electronic discovery today. But the Principles had not seen a full-scale rewrite since 2007. Since that time, electronic data sources have exponentially increased and e-discovery itself has morphed into a $10 billion business. The wait, though, has come to a close.

    November 02, 2017Zach Warren
  • From New Reporting Functionality to Cross-Application Tagging and Security Features, the New Updates Aim to Round Out Office 365's Information Governance and Cybersecurity Features

    In a bid to appeal to legal professionals, Microsoft has updated Office 365 with information governance, security, and e-discovery capabilities, and encouraged legal technology integration with its platform.

    November 02, 2017Rhys Dipshan
  • The European Commission (EU) is ramping up pressure on tech companies to more aggressively use automated filtering to scrub "illegal" content from the Internet, a move that is drawing criticism from some lawyers and free speech activists in Silicon Valley.

    November 02, 2017Ben Hancock
  • Lessons from 2017 Enforcement Actions and Guidance

    Regulators including the FTC, the Department of Health and Human Services Office of Civil Rights (OCR) — the agency responsible for enforcing the HIPAA rules for protected health information (PHI) — and state attorneys general have issued guidance and announced a number of settlements in data security cases that are instructive about measures that organizations can take to reduce the potential for a data breach or, if a breach does occur, provide appropriate notice.

    November 01, 2017Kevin Coy