Features

There May Be 'No Do-Overs,' but SEC Hack Provides Important Security Lessons
Even the Securities and Exchange Commission (SEC) can get hacked — and the recently announced cyber attack against the SEC is providing an important wake-up call for U.S. companies regulated by the powerful agency and the attorneys they work with.
Features

FTC Moves Directly Against Social Media Influencers
The FTC has faulted social media influencers for failing to disclose the payments behind their seemingly organic endorsements. But the FTC only reached settlements with the companies, raising a question of when — if ever — the agency would directly go after the influencers.
Features

Qualcomm Slammed In Patent Brawl With Apple
Qualcomm Inc. lost two pretrial skirmishes last month in its patent and antitrust battle against Apple Inc. — in just about every way imaginable.
Features

Website Accessibility: The Law and Your Business Priorities
The first step to solving a problem is knowing it exists. But many businesses have never thought to ask whether their customer-facing websites are accessible to people with disabilities, and only become aware of the issue when they are sent a demand letter or served with a lawsuit alleging that their site violates the Americans with Disabilities Act (ADA).
Features

<i>Legal Tech</i><br> Teaching an Old Dog New Tricks: Business Process Management and Law Firms
Though traditionally considered laggards when adopting new technology, law firms have recently started to explore new tricks to fortify performance across their organizations. While this evolution is critical to a firm's survival, it's important that firm administrators understand that substantive improvements are only possible through multi-directional change.
Features

Trade Secrets Litigation: The No-Longer-Forgotten Part of the Tech IP Arsenal
<b><i>With Massive Jury Rewards and the DTSA Encouraging Federal Litigation, Trade Secrets Litigation Is Seeing a Surge in the Tech Industry</b></i><p>These days, many of the big IP litigation battles involving companies like Facebook, Uber, and Epic, have nothing to do with patents, trademarks or copyrights at all. Instead, it's all about the perhaps forgotten part of IP: trade secrets.
Features

A Dragonfly in the Ointment: Cyber Attacks on the Energy Sector May Signal Dark Days Ahead
Recent attacks may not yet have resulted in damages or disruption, but the group appears to be positioning itself to learn how the targeted energy facilities operate while attempting to gain access to operational control systems, if they have not done so already.
Features

Vendor Contracting for Privacy and Security
In an effort to continue to capture ongoing and new business, vendors may be opening themselves up to liability due to poorly drafted contracts with companies. In addition, in a rush by companies to have data shifted to the cloud, privacy concerns may be dangerously minimized.
Features

What's the Deal with WhatsApp?
<b><i>Investigating and Discovering Mobile Device Data</b></i><p>Analyzing data from mobile devices is still uncharted territory for many in Legal and IT. Accordingly, today's modern legal and technology professionals need to brush-up on all things mobile. This includes understanding where applicable data resides in a mobile device and what common challenges are associated with accessing, preserving and extracting this data. One such app taking the mobile device world by storm is WhatsApp.
Features

Industry Vendors Exploited Via Industry-Wide Cyber Attacks
<b><i>How to Protect Your Firm from Vendor Risks</b></i><p>The legal industry is still lulled into a false sense of security, mistakenly assuming that they are immune to a significant IT business outage, and that those unfortunate firms affected by cybercriminals were somehow lacking in adequate cybersecurity presages. That's simply not true. Even Achilles had a weak spot.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- COVID-19: Economic Stimulus and SBA LoansA summary of information on the various provisions under the new federal economic stimulus package.Read More ›
- Licensing Audits from Licensees' PerspectiveThe audit clause is a necessary means for the licensor to protect its interests and to guard against unscrupulous licensees. But it is a mistake to think that the clause is there solely to prevent malfeasance.Read More ›