Features

Virtual Snooping
The modern-day snoop is all too often someone you know. If this consideration doesn't leave you paranoid and looking over your shoulder, it should.
Features

Presidential Cybersecurity Handoff
Given the pending change in administration and uncertainty around President-elect Trump's priorities on cybersecurity, an analysis of the current federal cyber landscape may yield insights into how the next administration might prioritize their approach on this important front.
Features

Internet Law in a Trump Presidency
President Trump is already being pressured to reverse President Obama's Open Internet Order (also known as “net neutrality”) and take an aggressive stance against it. It remains to be seen how President Trump will balance the call for privacy regulations amidst our country's vulnerability to cyber-attacks.
Features

Is Your Data Breach Response Plan Good Enough? Stress Test It
As the chances of a data breach incident increase, savvy businesses have invested time and thought in a response plan. But plans never survive first contact with the enemy. Stress test your incident response plan to find and resolve its weaknesses while time is on your side.
Features

Most Firms Feel Assured in Cybersecurity Abilities, But Is That False Confidence?
Law firms are increasingly confident in their cybersecurity capabilities, despite many falling short of adequate breach response preparation.
Features

AI and the Law: The Paradigm Shift Hits the Fan
In its astonishing "Free the Law" project, Harvard has teamed up with a California start-up called Ravel Law to digitize every state, federal, territorial and tribal judicial decision since colonial times by feeding over 40 million pages physically cut from the books shelved in the Harvard Law Library into a high-speed digital scanner.
Features

Movie Filtering Company Is Told To Shut Down
A start-up that provides a technology that filters movies for profanity, violence and other objectionable content has vowed to take a copyright battle against Hollywood all the way to the U.S. Supreme Court after a federal judge granted an injunction blocking its service.
Features

Cybersecurity Comes Together In Legal and Finance
Data security in the financial and legal industries is a tale of two sectors. While the financial industry is heavily regulated and constantly watched by federal agencies, law has at times operated in an almost laissez-faire environment, more ruled by a culture of confidentiality and secrecy than hard regulatory rules.
Features

Data Breach Lawsuit Highlights the Need for Diligence when Purchasing Cyberinsurance
Well-known restaurant chain, P.F. Chang's China Bistro, recently sustained a significant hit to its cyberinsurance coverage. The federal court's opinion in the case serves as a lesson to policyholders regarding cyberinsurance in a rapidly evolving market. Due diligence is the name of the game when placing such insurance in order to understand the scope of coverage.
Features

Practical Approaches to the EU-US Privacy Shield
This article discusses the corporate impact of the EU-US Privacy Shield and practical approaches to managing global corporate data in the wake of <i>Schrems</i>.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Why So Many Great Lawyers Stink at Business Development and What Law Firms Are Doing About ItWhy is it that those who are best skilled at advocating for others are ill-equipped at advocating for their own skills and what to do about it?Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Blockchain Domains: New Developments for Brand OwnersBlockchain domain names offer decentralized alternatives to traditional DNS-based domain names, promising enhanced security, privacy and censorship resistance. However, these benefits come with significant challenges, particularly for brand owners seeking to protect their trademarks in these new digital spaces.Read More ›
- Disavowals of Liability Do Not Disembowel Coverage: Liability Settlements and Insurance CoverageLiability insurance policies apply where the insured is liable for bodily injury, property damage, or wrongful acts (depending on the policy). What happens, however, when the policyholder denies that any injury or wrongdoing took place? Does that mean that insurance is not applicable?Read More ›