Features

Untangling the Mystery of Cybersecurity Insurance
There are more technology options available to protect businesses than ever before, and both the U.S. government and private industry have made great strides in understanding and combating some of the most common cyber threats.
Features

Building a Business Case for a Data Privacy Program
When members of the Compliance, Governance and Oversight Council (CGOC) discuss data privacy and security today, I see an entirely new level of urgency.…
Features

Can User Behavior Analytics Do a Better Job of Protecting Your Organization's Data?
IT security professionals will tell you that the bulk of spending on cybersecurity in large organizations in recent years has been toward perimeter tools like firewalls. And yet the relentless pace of major data breaches has shown no signs of letting up.
Features

Search Warrants for IoT Data Spur Legal, Privacy Complications
<b><i><font size="-1"> Law Enforcement Attempts to Access Amazon Echo Raise Questions over the Viability of IoT Data in Investigations and the Vulnerability of Private Information</b></i></font><p>A case surrounding a mysterious death in a Benton County, AR, has far-reaching implications for the ownership and privacy of data generated from Internet-connected devices.
Features

Cybersecurity Public Private Partnerships: Challenges and Opportunities
Close cooperation between the public and private sector is crucial, given the enormous risks associated with the continued acceleration of global connectedness. Upon closer inspection, however, significant cultural and legal barriers exist that can hinder further cooperation necessary to effectively combat the cyber theat.
Features

<i>Online Extra</i><br>Snapchat Maker Sued by Ex-Employee Who Says Company Misrepresented Finances
Snap Inc., maker of pic-sharing app Snapchat, was hit with a wrongful termination lawsuit on Jan. 4 by a former employee who alleges the company made false…
Features

Data Breach by Insiders: Three Key Steps to Keep Your Company Out of the Headlines
For many of us, the term "data breach" conjures up images of a shadowy character in a dark hoodie — a nefarious criminal. But the more we understand about how data breach incidents originate and propagate, the more likely we are to shift focus from outsider hackers to insider threats.
Features

<i><b>Legal Tech:</i></b><br>Three Legal Challenges In-House Counsel Face with 3-D Printing
<b><i>As 3-D Printing Becomes More Widespread, In-House Counsel Will Be Tasked with Complex IP and Liability Challenges</b></i><p>Yet another potentially disruptive technology is set to join the ranks of blockchain and AI as a headache for legal: 3-D printing. While its use in legal is limited, 3-D printing presents unique challenges to in-house counsel prosecuting or defending IP and liability issues.
Features

<i>Online Extra</i><br>DOL Sues Google Over Failure to Provide Compensation Data
The Department of Labor (DOL) is asking an administrative law judge to order the company to turn over information on job and salary history for employees…
Features

Make 2017 the Year To Get Smart
Taking Your Firm's CI to the Next Level
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- The Anti-Assignment Override ProvisionsUCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?Read More ›