Features

It's Time to Take Third-Party Risk Seriously
The use of new technologies such as the Internet of Things (IoT), mobile and cloud by vendors add to the question: Where is my data, and how can I protect it when it is in someone else's hands? In the hustle and bustle of daily business, third parties often become the overlooked or unwitting accomplice in criminal activities.
Features

The Data-Driven Law Firm: The Next Frontier
The next generation of elite law firms may have little in common with today's leading global providers of legal services. Whereas historically top-performing law firms combine stellar talent with marquee clients, brand reputation and client-focused excellence to rise to the top, future leading law firms are equally likely to rise to power using a distinctly different recipe: namely, a mixture of market savvy, strategic agility and operational effectiveness powered by data.
Features

The State of the U.S. Privacy Job Market, 2019
A Reflection on the Year Behind, the Years Ahead and Why Privacy Means So Much to Us Part One of a Two-Part Article In just over a year since GDPR Day, privacy by design has made privacy as a profession one of the fastest growing and hottest verticals in and outside of the legal job market.
Features

Legislative Heat Wave: A Mid-Year Review of Upcoming Cybersecurity Laws and Enforcement Activity
While legislation to enhance data privacy rights and obligations continue to make headlines, regulators and legislators are also stepping up their cybersecurity expectations. In the first half of 2019, a number of states have updated their existing data breach notification laws and passed new cybersecurity requirements.
Features

How to Keep Mobile Data Safe: The Case for On-Device AI
Bring Your Own Device is one of the biggest compliance-related issues companies face today, and when it comes to security risks, law firms are prime targets. Considering law firms are built on their reputation, firms must make every assurance that the technology they use will protect their data.
Features

Cybersecurity Spending on the Rise in 2019
As data security challenges continue to escalate, many law firms and corporate legal departments are upping their efforts to strengthen cyber defenses and minimize risks.
Features

SHIELD Act Signed in NY
<b><i>Defines Data Breach and Requires Data Security Controls</b></i><p>New York has brought itself into line with a number of states concerning how they define a data breach, and, where applicable, what substantive security controls they require.
Features

Just Say No to Hackers
<b><i>Conference of Mayors Resolution Calls for Cities Not to Pay Ransomware</b></i><p>The underlying logic is pretty straightforward: if bad actors realize that there's no longer any cash waiting for them at the end of the rainbow, they'll eventually pack up their ball and go home.
Features

EU Court Rules Adding Facebook 'Like' Button Triggers GDPR Data Collection Obligation
Websites with embedded Facebook “like” buttons must inform users their data will be collected and processed by the social media giant, the Court of Justice of the European Union has ruled.
Features

Legal Tech: Smart Speakers and E-Discovery
For businesses that own such a device, or for individual employees who might have a personally owned one on their office desk, the question of who owns any recorded data remains murky.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Legal Possession: What Does It Mean?Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Cutting Off the Stream: How United States v. Silver Affects "Stream of Benefits" or "Retainer" BriberyAlthough the court stressed that, by vacating certain of former NY State Assembly Speaker Sheldon Silver's counts of conviction, it was clarifying and not altering the "as opportunities arise" theory, it nevertheless emphasized that this theory requires particularity with respect to the "question or matter" that is the subject of the bribe payor and recipient's corrupt agreement.Read More ›