Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Security First Approach Provides a Significant Advantage to Law Firms Image

Security First Approach Provides a Significant Advantage to Law Firms

Mark Sangster

The security industry all too often sells the next shiny object touted as the Holy Grail of security that protects against all cyber threats. And the following year, the next best thing hits the market and becomes the grail until proven fallible.

Features

Equifax Breach Will Fuel Identity Theft Remediation Debate Image

Equifax Breach Will Fuel Identity Theft Remediation Debate

Angela R. Matney

In the wake of suits filed against Equifax by consumers, businesses and governmental units, courts will have to grapple with the question of what remedies are appropriate. These issues are not unique to the Equifax incident, but the scope of the breach will undoubtedly lead to more debate than ever before.

Features

Bitcoin Is Fueling the Ransomware Epidemic Image

Bitcoin Is Fueling the Ransomware Epidemic

M. Scott Koller

Money is a powerful motivator, but it alone wasn't enough to fuel the ransomware epidemic. After all, the first documented ransomware infection was in 1989, but it remained relatively unknown until its resurgence over the past five years. So what changed? In short, bitcoin.

Features

The Myth of the Secure Cloud Image

The Myth of the Secure Cloud

Nina Cunningham

“There's really no such thing as the cloud, there are only other people's computers.” This may have been true at first; but it is now worth some investigation if the present threat environment today demands a secure cloud.

Features

DRaaS: How It Takes a Law Firm's DR Beyond Insurance Image

DRaaS: How It Takes a Law Firm's DR Beyond Insurance

Jeff Ton

With expectations for an always-on law firm, significant challenges within the legal industry to maintain competitiveness and perform due practice for cybersecurity and other disaster scenarios come from both clients and regulatory bodies. A comprehensive approach with an end-to-end availability strategy is imperative to mitigate the threats of downtime. And yet, this is easier said than done.

Features

The Myth of the Secure Cloud Image

The Myth of the Secure Cloud

Nina Cunningham

"There's really no such thing as the cloud, there are only other people's computers." This may have been true at first; but it is now worth some investigation if the present threat environment today demands a secure cloud.

Features

The Equifax Breach: Why This One Is Different Image

The Equifax Breach: Why This One Is Different

F. Paul Greene

This is not the first time that a credit reporting agency has been breached, nor is it the first time that Equifax has reported a breach. What <i>is</i> different with the current breach is its size and the nature of information compromised, as well as the implications of the breach in light of the increasingly complex web of cybersecurity regulations nationwide.

Features

5 Things to Know About the First Wave of Equifax Actions Image

5 Things to Know About the First Wave of Equifax Actions

Amanda Bronstad

With 143 million people potentially hit by Equifax Inc.'s data breach, there's no doubt there will lawsuits — a lot of them."You'll have suits in…

Features

Big Data, Web 'Scraping' and Competition Law Image

Big Data, Web 'Scraping' and Competition Law

Shepard Goldfein & James Keyte

<b><i>The Debate Continues</i></b><p>Web "scraping" is one method of accumulating data that has sparked recent legal debate, both antitrust and otherwise. Legal challenges to Web scraping have involved privacy claims and claims under the federal Computer Fraud and Abuse Act, in addition to antitrust claims about the need to collect public data to be able to compete freely.

Features

Patent Lost Profit Damages and Apportionment Image

Patent Lost Profit Damages and Apportionment

Amy Proctor & Molly Russell

<b><i>Split Federal Circuit Declined to Reconsider Panel's Decision that Lost Profits Based on the</i> Panduit <i>Factors Are Fully Apportioned</b></i><p>On Sept. 1, 2017, a split Federal Circuit declined to rehear a panel decision in <i>Mentor Graphics Corp. v. EVE-USA, Inc.</i>, a case that could have significant implications for lost profit damages and apportionment.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • 'Customary Operations' or A Vacant Building?
    Many times, courts are faced with the question of whether a loss location is 'vacant' under a commercial property policy when trying to determine if the building owner or lessee is conducting customary operations. This article explores various decisions across the United States as to what is considered 'customary operations,' thereby rendering the property 'vacant.'
    Read More ›
  • Reining in the Inequitable Conduct Defense
    Responding to views from the U.S. Patent and Trademark Office and elsewhere about the unintended consequences of the current inequitable conduct doctrine, a divided <i>en banc</i> Federal Circuit decision issued on May 25, 2011 adjusted the standard of the materiality element to make this defense harder to establish.
    Read More ›
  • Authorship and Copyright In Hybrid AI-Human Collaborative Works
    The United States Copyright Office recently issued a letter ruling on the copyrightability of Kristina Kashtanova's comic book-like work, Zarya of the Dawn. The Kashtanova ruling indicates that the Copyright Office's determination of copyrightability of works involving use of AI will rely on whether the author is able to control and foresee with some measure of predictability the output of the authorial process
    Read More ›