Features

Safeguarding Client Data: An Attorney's Duty to Provide 'Reasonable' Security
Effective cybersecurity requires an ongoing, risk-based, comprehensive process that addresses people, policies and procedures, and technology, including training. Effective security also requires an understanding that security is everyone's responsibility and constant security awareness by all users of technology.
Features

New York's Cyber Regulation Two Years Later: We've Only Just Begun
<b><i>The Conclusion of the “Transitional Period” for New York's Cybersecurity Regulation Marks the Beginning, Rather Than the End, of an Organization's Compliance Efforts</b></i><p> Financial institutions will have to certify annually that their internal controls and cybersecurity practices remain up to snuff. And now that the transitional periods for implementing the cyber regulation have passed, covered institutions will need to certify that they have complied with each provision.
Features

Legal Tech: The 2019 EDRM TAR Guidelines — Recognizing the Evolving Role of the Subject Matter Expert
After reading the new Technology Assisted Review (TAR) Guidelines from EDRM, it is clear that the evolution of the underlying technology in TAR solutions is reshaping the role of the subject matter expert (SME).
Features

Hey! That's My Move!
Copyright, Fortnite and the Ability to Protect How You Shake Your Groove Thing The U.S. Supreme Court just crashed the copyright world's latest dance party — stepping on the toes of a soiree of copyright infringement lawsuits against videogame developer Epic Games, the creator of Fortnite.
Features

E-discovery and Beyond: Facing Change in the Age of AI
A Roundtable Discussion Experts share their experience and insight on the evolving acceptance and use of AI and advanced analytics tools for e-discovery — and beyond.
Features

Is Cyber-Risk Insurable?
In an environment of moving targets, it seems unimaginable that insurance against cybersecurity attacks can be robust enough to provide real protection. There are many types of risks involved, and some include physical damage to property.
Features

The Principles of Good Cyber Risk Management
Apart from headline grabbing attacks, we are now seeing an epidemic of cyber attacks. Concern has shifted from dealing with data being stolen and sold on the dark Web to handling serious ransomware and destructive attacks, where attackers are looking for immediate monetary output.
Features

Will the EU-Japan Data Transfer Partnership Agreement Have Global Influence?
With countries around the world examining and strengthening their data protection laws, this agreement could be the first of many and will undoubtedly have global repercussions.
Features

Second Circuit Blocks Video Privacy Suit Brought Against Barnes & Noble
A would-be class action against Barnes & Noble could have cost the bookseller hundreds of millions of dollars — not to mention a reputational hit for allegedly sharing private information about its customers' online video purchases with Facebook.
Features

Privacy Notices, Opt-In Clauses Debated as U.S. Regulators Shape Federal Privacy Law
Tech giants' privacy counsel and U.S. senators discussed opt-in policies, lengthy, legalese-filled privacy notices and location tracking. The discussion aimed to further shape a potential U.S. federal data privacy law.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- "Holy Fair Use, Batman": Copyright, Fair Use and the Dark KnightThe copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›