Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Social Media Scene: The Easy Path to Success on Social Media — The 1% Rule of the Internet Image

Social Media Scene: The Easy Path to Success on Social Media — The 1% Rule of the Internet

Spencer X. Smith

You may have read a dozen “How To” articles about cracking the algorithms — which sound very mathematical — of any social media platform, but at the end of the day, you're communicating with people.

Features

The Strategy of What You Don't Invest In Image

The Strategy of What You Don't Invest In

Scott McFetters

Advanced technology isn't free. Outfitting your team with equipment that will move the needle can require an impossibly large capital outlay. The solution may not be, therefore, to purchase all that gear. It may be to lease or finance it.

Features

Elections: The Hidden Security Danger for Governments Image

Elections: The Hidden Security Danger for Governments

Roy E. Hadley, Jr.

The news is replete with alleged actions of foreign governments and hackers trying to impact the democratic election process in the United States. It is incumbent upon the state and local governments to ensure the security of all elections.

Features

Why Do Cybersecurity Programs Fail? Image

Why Do Cybersecurity Programs Fail?

Chris Moschovitis

It seems this should be a key question for everyone in business, government, technology, and cybersecurity: If we know the problem with cybersecurity, and have ways of methods of addressing the problem, why are we still failing?

Features

Cybersecurity Ranks Among Top Concerns of Corporate Legal Departments Image

Cybersecurity Ranks Among Top Concerns of Corporate Legal Departments

Chris Maguire

A survey of more than 460 attorneys and decision makers working in corporate legal departments nationwide found that in-house teams, already stretched by limited resources, are confronting new and traditional challenges. Cybersecurity ranked among legal departments' biggest concerns for 2018.

Features

Phishing for Whales with Spears Image

Phishing for Whales with Spears

Eli Nussbaum

<b><i>What Your Organization Can Do to Protect Itself from Email-Based Attacks</b></i><p>There's no question that email has revolutionized the way we operate. Unfortunately, for all of its convenience, email has opened the door to serious security threats that include viruses, malware and fraud. Phishing scams have become a widespread problem — you'd be hard pressed to find anyone who hasn't been on the receiving end of a phishing attempt.

Features

Understanding the Intersection Between GDPR and Cybersecurity Image

Understanding the Intersection Between GDPR and Cybersecurity

Jake Frazier & Anthony J. Ferrante

It's been about half a year since Europe's General Data Protection Regulation (GDPR) was activated, and corporate legal, privacy and compliance teams are beginning to adjust to the new lay of the land. We've seen early examples of enforcement activity, and those are helping organizations better understand the long-term landscape for compliance.

Features

Legal Tech: Stop, Collaborate and Listen -- Collaboration Tools Are a Brand New Invention Image

Legal Tech: Stop, Collaborate and Listen -- Collaboration Tools Are a Brand New Invention

Michele C.S. Lange

Today's workplaces require tools that enhance employee productivity and provide the flexibility to never miss a critical business opportunity. Organizations in other industries have already experienced the benefits of enterprise collaboration, and now this technology is making its way into the legal sector. The rise of enterprise collaboration is redefining the modern law firm and legal department.

Features

Unprepared for a Cyberattack? The DOJ Wants to Change That Image

Unprepared for a Cyberattack? The DOJ Wants to Change That

Phillip Bantz

<b><i>New U.S. Department of Justice Cybersecurity Guidelines Stress Preparedness Amid Reports That Many Organizations Have Failed to Plan for a Breach</b></i><p>Data protection tips are virtually everywhere these days. So it's hardly surprising that the U.S. Department of Justice has released new guidelines on that very topic. The UK's National Cyber Security Centre is poised to follow suit.

Features

Robbing a Locked Bank Vault from Home: Legal Issues Raised by Cryptocurrency Frauds Image

Robbing a Locked Bank Vault from Home: Legal Issues Raised by Cryptocurrency Frauds

Chris Ott

The advent of cryptocurrencies has raised a host of legal issues; some of the most immediate ones — such as whether cryptocurrencies are securities — appear to have been resolved, but cryptocurrency theft remains a major concern for traders and investors given that billions of dollars of cryptocurrency are stolen every year.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›