Features

Companies Poised To Repeat Data Privacy Compliance Mistakes
<b><i>New Study Shows U.S. Companies Are Taking the Same Failed Approach To Complying With California's Privacy Regulation As They Did for GDPR</b></i><p>U.S. companies haven't learned much from the missteps they made while preparing for the European Union's General Data Protection Regulation (GDPR), suggests a new study on data privacy regulation compliance.
Features

Are Online Reviews Threatening Your Online Reputation?
An attorney's reputation may be one of the most important factors that clients consider before hiring counsel. In today's world of online reviews, managing your reputation can be challenging. How should you manage online reviews to ensure your reputation and trustworthiness are intact?
Features

State Report: New NJ Data Breach Notification Legislation Signed
Legislation expanding the types of personal data that will trigger a required notification to customers in case of a breach, including email addresses and passwords, was signed into law by Gov. Phil Murphy.
Features

State Report: NY Creates Nation's First Regulatory Cybersecurity Division
New York's financial regulatory agency has created a first-in-the-nation cybersecurity division to place special focus on protecting the state's consumers and industries from digital threats.
Features

Stanford Is Serving 11 Flavors of NPE
Stanford Law School made available to the public a database of every patent lawsuit that's been filed since 2007.
Features

Professional Development: Why an Online “To-Do” List and Notes Are So Important
<i><b>If You Want To Do More, Go Paper-Less</i></b><p>he secret to increased productivity and a powerful agenda process is to finally ditch the paper and move to a more flexible system for both your daily to-do list and notes. This article makes the case for why moving to a digital platform for a to-do list and notes will increase your productivity.
Features

The Nice-to-Haves and Need-to-Haves of Cloud Computing
This article discusses what to look for in a cloud service provider and other issues that will help determine if moving to the cloud is the right move for your firm.
Features

IP Theft Goes Far Beyond the Huawei Scandal: How to Stay Safe
IP theft is not limited to kingpins of business. Even if your organization has never appeared in the headlines, you cannot rest easy that no one is interested in acquiring your know-how. In fact, analysis the results of our survey for the 2018 Netwrix IT Risks Report reveals that small and medium organizations are actually more vulnerable to IP theft and cyber espionage than enterprises.
Features

Data Security Ethics and Best Practices for Court Reporters
The issue of digital security and privacy should be a paramount concern to modern court reporters just as it is to their attorney clients. Yet their biggest risk remains the same as everyone else's: believing it won't happen to them.
Features

The Eyes (and Privacy Laws) of Texas Are Upon You
<b><i>Consistent With the Cliché That “Everything's Bigger In Texas,” the Texas Legislature Has Introduced Not One, But Two Separate Bills Relating to the Privacy of Personal Information</b></i><p>The TPPA is arguably the less onerous of the two bills, although you might not necessarily realize it at first blush, given the broad way it defines “personal identifying information” (PII).
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- Risks of “Baseball Arbitration” in Resolving Real Estate Disputes“Baseball arbitration” refers to the process used in Major League Baseball in which if an eligible player's representative and the club ownership cannot reach a compensation agreement through negotiation, each party enters a final submission and during a formal hearing each side — player and management — presents its case and then the designated panel of arbitrators chooses one of the salary bids with no other result being allowed. This method has become increasingly popular even beyond the sport of baseball.Read More ›
- Private Equity Valuation: A Significant DecisionInsiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity LitigationWhile the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.Read More ›