Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

CFPB Takes Step Into Cybersecurity Regulation Image

CFPB Takes Step Into Cybersecurity Regulation

C. Ryan Barber

The Consumer Financial Protection Bureau (CFPB) has fired a shot across the bow of the burgeoning online-payment industry, taking an enforcement action this week that marked the agency's first foray into regulating cybersecurity.

Features

<b><i>Online Extra:</b></i> Malware Increasingly Making Its Way into Organizations Through Social Media Image

<b><i>Online Extra:</b></i> Malware Increasingly Making Its Way into Organizations Through Social Media

Zach Warren

To say 'social media is everywhere' these days may be slightly archaic. Of course it's everywhere. Chances are, you're reading this article with at least one social media application running or open in a browser right now. But why, then, aren't these social media platforms as secure as they could be? A new 'Best Practices for Social Media Archiving and Security' survey from Osterman Research found that although enterprise and consumer-focused social platforms abound in modern organizations, social media remains a threat for many companies.

Features

<b><i>Online Extra:</b></i> Dozens of Big Firms Targeted by Hacker Seeking M&A Info Image

<b><i>Online Extra:</b></i> Dozens of Big Firms Targeted by Hacker Seeking M&A Info

Nell Gluckman

For several years law firms have been a key target for hackers seeking to obtain confidential information about initial public offerings, intellectual property and M&amp;A deals, claim cybersecurity consultants, but rarely does word about specific attacks become public.On March 29, Crain's Chicago Business reported that 48 top firms, most of which appear in the Am Law 100 rankings, were targeted recently by a Russian hacker living in Ukraine seeking to trade on M&amp;A information stolen from law firms.

Features

<b><i>Case Study</b></i>LAZINGA!: An Advanced Online Directory for Legal Professionals Image

<b><i>Case Study</b></i>LAZINGA!: An Advanced Online Directory for Legal Professionals

Jason Searns

My law firm is always looking for ways to simplify day-to-day processes. This includes having the most up-to-date software systems, streamlined and manageable billing systems, and the most cost effective ways to resource qualified temporary and permanent staffing.

Features

Top Security Intrusion Trends the Legal Community Should Watch Image

Top Security Intrusion Trends the Legal Community Should Watch

Steven Chabinsky

Lawyers are increasingly expected to understand the implications of cybersecurity when providing advice relating to a long list of matters that include privacy compliance, contract compliance, data breach response, data breach litigation, M&amp;A due diligence, and insurance coverage. As a result, it is important that lawyers understand the latest trends in cyber intrusions that may expose their stakeholders to unwarranted risk and allow adversaries to exploit technical and human vulnerabilities.

Features

Internet Task Force Examines Copyright In the Digital Age Image

Internet Task Force Examines Copyright In the Digital Age

Robert W. Clarida & Robert J. Bernstein

On Jan. 28, the Commerce Department issued a much-anticipated policy statement entitled "White Paper on Remixes, First Sale and Statutory Damages: Copyright Policy, Creativity, and Innovation in the Digital Economy." This article briefly describes the white paper's scope and recommendations, with a focus on the issue of statutory damages, as to which the white paper proposes several amendments to the current Copyright Act.

Features

Enterprise Legal Management Image

Enterprise Legal Management

Jason Parkman

The function of legal departments has shifted from primarily managing legal matters and costs to acting as revenue generators that provide information and analytics valuable to the entire company. This article offers a primer about enterprise legal management (ELM).

Features

Privacy v. Data Security Image

Privacy v. Data Security

John Hutchins

The year 2005 really marked the beginning of the "era of data breaches," and with it, the "era of data breach lawsuits." In its place, what is now commonplace in the wake of major data breaches ' class action "privacy" litigation on behalf of data subjects, seeking millions of dollars in damages, under a dizzying array of legal theories.

Features

Cost Recovery in 2016 Image

Cost Recovery in 2016

Rob Mattern

2016 is in full swing and we will soon be conducting the 2016 Mattern &amp; Associates Cost Recovery Survey. We've been conducting this bi-annual survey since 2004 and, during that time, it has become an industry resource for tracking the cost recovery practices of law firms across size and geography.

Features

<b><i>Online Extra:</b></i> FDIC Chimes In on Cybersecurity Image

<b><i>Online Extra:</b></i> FDIC Chimes In on Cybersecurity

Marlisse Silver Sweeney

The Federal Deposit Insurance Corporation is the latest entity to release a framework for cybersecurity.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›