Features

NY 'Facebook' Decision Leaves Many Questions Open
In a newsworthy case in which retail giant Amazon and social media developer Foursquare Labs, among others, submitted friend of the court briefs, the New York Court of Appeals affirmed decisions which denied Facebook's motion to quash warrants issued to it by the Manhattan District Attorney's Office and denied Facebook's motion to compel disclosure of the district attorney's supporting affidavit to its warrant application.
Features

Future Shock? Uncertainty over Long-Term Effects of the FCC Privacy Rules Repeal
<b><i>The Repeal May Open Up ISPs to Future Legal Challenges on How and When They Can Sell Their Customer's Private Data</b></i><p>While the recent repeal of the Federal Communications Commissions' (FCC) broadband privacy rules have caused an uproar over what many may see as lagging federal data privacy protections, it does little to change how broadband ISPs handle their users' data.
Features

<b><i>Online Extra:</b></i><br> Legislation to Block a 'Netflix' Tax Is Shelved Amid Opposition
A Southern California assemblyman on Monday shelved legislation that would have blocked cities from taxing streaming video services such as Netflix and Hulu.
Features

<b><i>Legal Tech: e-Discovery</b></i><br> <b><i>Solo v. United Parcel Services</b></i>: A Conversation About Proportionality
Three leading e-discovery industry thought-leaders recap some of the latest case-law and provide their takeaways.
Features

Financing and Leasing Technology Is a Strategic Advantage
Advances in technology and software are being made at an increasingly rapid pace. As a result, IT hardware obsolescence cycles are shrinking too. This period of exponential improvement with which we are all now familiar has shown time and again that there will continue to be breakthroughs in technology that deliver better, less expensive, and/or more robust products. How are you equipping your firm to succeed both in the present day and into the future?
Features

Using Computer Forensics to Investigate Employee Data Theft
When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft-of-IP analysis in order to preserve electronic data and uncover important evidence.
Features

State of the Industry: e-Discovery and Cybersecurity
<b><i>Part One of a Three-Part Article</b></i><p>There are stark differences between e-discovery and cybersecurity, most notably that cybersecurity, as an avenue of career opportunity and responsibility, is much, much bigger. An examination of the current state of both industries coupled with a deep dive into the history of e-discovery will offer a prophetic look at the likely hiring patterns, job availability, compensation trends, and industry maturation of the cybersecurity vertical over the next decade.
Features

Got a Negative Online Review? First Things First: Turn Off Your Attorney
It happened. Some current or former client had the gall to write something less than flattering about you online. What do you do? The first thing to do, and this can be the hardest thing for attorneys, is to turn off your attorney. Feedback can be hard to take.
Features

Information Governance: Law Firms' Cybersecurity Weak Spot
Perimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.
Features

Survey Reflects Growth in How Corporations Manage and Protect Information
Many organizations are changing their approach to leveraging cybersecurity intelligence through enhanced cooperation, detailed information sharing, and broad-based collaboration. To characterize those shifts and offer perspectives that empower effective benchmarking, for the third consecutive year, Nuix engaged my firm to interview corporate security officials. The report reflects the perspectives of 29 cybersecurity executives across a range of industries.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- The Anti-Assignment Override ProvisionsUCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?Read More ›