Features
CFPB Takes Step Into Cybersecurity Regulation
The Consumer Financial Protection Bureau (CFPB) has fired a shot across the bow of the burgeoning online-payment industry, taking an enforcement action this week that marked the agency's first foray into regulating cybersecurity.
Features
<b><i>Online Extra:</b></i> Malware Increasingly Making Its Way into Organizations Through Social Media
To say 'social media is everywhere' these days may be slightly archaic. Of course it's everywhere. Chances are, you're reading this article with at least one social media application running or open in a browser right now. But why, then, aren't these social media platforms as secure as they could be? A new 'Best Practices for Social Media Archiving and Security' survey from Osterman Research found that although enterprise and consumer-focused social platforms abound in modern organizations, social media remains a threat for many companies.
Features
<b><i>Online Extra:</b></i> Dozens of Big Firms Targeted by Hacker Seeking M&A Info
For several years law firms have been a key target for hackers seeking to obtain confidential information about initial public offerings, intellectual property and M&A deals, claim cybersecurity consultants, but rarely does word about specific attacks become public.On March 29, Crain's Chicago Business reported that 48 top firms, most of which appear in the Am Law 100 rankings, were targeted recently by a Russian hacker living in Ukraine seeking to trade on M&A information stolen from law firms.
Features
<b><i>Case Study</b></i>LAZINGA!: An Advanced Online Directory for Legal Professionals
My law firm is always looking for ways to simplify day-to-day processes. This includes having the most up-to-date software systems, streamlined and manageable billing systems, and the most cost effective ways to resource qualified temporary and permanent staffing.
Features
Top Security Intrusion Trends the Legal Community Should Watch
Lawyers are increasingly expected to understand the implications of cybersecurity when providing advice relating to a long list of matters that include privacy compliance, contract compliance, data breach response, data breach litigation, M&A due diligence, and insurance coverage. As a result, it is important that lawyers understand the latest trends in cyber intrusions that may expose their stakeholders to unwarranted risk and allow adversaries to exploit technical and human vulnerabilities.
Features
Internet Task Force Examines Copyright In the Digital Age
On Jan. 28, the Commerce Department issued a much-anticipated policy statement entitled "White Paper on Remixes, First Sale and Statutory Damages: Copyright Policy, Creativity, and Innovation in the Digital Economy." This article briefly describes the white paper's scope and recommendations, with a focus on the issue of statutory damages, as to which the white paper proposes several amendments to the current Copyright Act.
Features
Enterprise Legal Management
The function of legal departments has shifted from primarily managing legal matters and costs to acting as revenue generators that provide information and analytics valuable to the entire company. This article offers a primer about enterprise legal management (ELM).
Features
Privacy v. Data Security
The year 2005 really marked the beginning of the "era of data breaches," and with it, the "era of data breach lawsuits." In its place, what is now commonplace in the wake of major data breaches ' class action "privacy" litigation on behalf of data subjects, seeking millions of dollars in damages, under a dizzying array of legal theories.
Features
Cost Recovery in 2016
2016 is in full swing and we will soon be conducting the 2016 Mattern & Associates Cost Recovery Survey. We've been conducting this bi-annual survey since 2004 and, during that time, it has become an industry resource for tracking the cost recovery practices of law firms across size and geography.
Features
<b><i>Online Extra:</b></i> FDIC Chimes In on Cybersecurity
The Federal Deposit Insurance Corporation is the latest entity to release a framework for cybersecurity.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›