Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

LJN Online Has A New Look … and Your Action Is Required Image

LJN Online Has A New Look … and Your Action Is Required

LJN Staff

Law Journal Newsletters Online is not only getting a new look, but is now fully integrated with ALM and its other offerings.

Features

<i>CYBER-ETHICS:</i> Technological Competence Obligations and the Interplay of the ABA Model Rules and Attorney Cybersecurity Image

<i>CYBER-ETHICS:</i> Technological Competence Obligations and the Interplay of the ABA Model Rules and Attorney Cybersecurity

Elizabeth (Lisa) Vandesteeg

The ABA has long published its Model Rules of Professional Conduct and modifies them from time-to-time to stay current with legal and technological developments and advances. While these Model Rules are not officially binding on attorneys, they have been adopted in large part by nearly every stateand provide a guideline for attorneys across the country regarding standards of professional responsibility and ethical conduct.

Features

Beats Headphones Royalty Dispute Saga Heads to Trial Image

Beats Headphones Royalty Dispute Saga Heads to Trial

Amanda Bronstad

Former hedge fund manager Steven Lamar, who helped launch Dr. Dre's Beats headphones a decade ago, won the right to go to trial against the rap artist and record producer after the California Court of Appeal revived his $100 million case over unpaid royalties.

Features

WB's Takedown Notices Aimed at Entertainment Co.'s Own Websites Image

WB's Takedown Notices Aimed at Entertainment Co.'s Own Websites

Jennifer Williams-Alvarez

Critics of the DMCA got some ammunition recently, when Warner Bros. asked Google to take down hundreds of copyright-infringing websites ' only to later realize that it had included legitimate sites and some of the entertainment company's own official pages. The blunder dredges up questions about whether the current notice-and-takedown system is working for both copyright owners and service providers.

Features

Supreme Court Term Promises to Be IP Blockbuster Image

Supreme Court Term Promises to Be IP Blockbuster

Scott Graham

With four IP cases on the docket and several more knocking at the door of certiorari, the U.S. Supreme Court is poised for a banner year of patent, trademark and copyright decisions.

Features

Privacy and Security of Personal Information Collected by Benefit Plans Image

Privacy and Security of Personal Information Collected by Benefit Plans

Marc Bussone

High profile cyberattacks and data breaches have become routine occurrences. Cyber threats are so pervasive that many privacy and security experts advise that responsible parties ' like fiduciaries of employee benefit plans ' should prepare for <i>when</i> a data breach occurs, not </i>if</i>. Plan sponsors and fiduciaries should be aware of, and address, security and privacy issues in connection with personal information.

Features

Data Breach Prevention and Information Governance Go Hand-In-Hand Image

Data Breach Prevention and Information Governance Go Hand-In-Hand

Jake Frazier

Information governance has a wide range of varying definitions, depending on whom you ask. Some consider it to be an amorphous collection of policies that are difficult to translate into the real world. Others view it as a holistic strategy document, or a series of discrete, tactical projects that implement best practices in data security or storage optimization.

Features

China's Second Draft Cybersecurity Law's Expanded Data Localization Requirement Image

China's Second Draft Cybersecurity Law's Expanded Data Localization Requirement

Tiana Zhang, Jodi Wu, Sally Han & Mike He

Cybersecurity has remained a priority for the Chinese government in 2016. The second draft of the Cybersecurity Law was released for public comment on July 5, 2016. Although still in draft form, when it is adopted, the Cybersecurity Law will impose a number of requirements on companies with business operations within the territory of China that have been subject to heated discussions among multinational companies (MNCs).

Features

Cybersecurity Comes Together in Legal and Finance Image

Cybersecurity Comes Together in Legal and Finance

Ricci Dipshan

Since the dawn of the new millennium, technology has been expanding the reach and ability of criminals at breakneck speeds. Regulators have constantly found themselves running behind a new era of cyberthreats and dangers, struggling to respond to accidents while fortifying the road ahead.

Features

Four Ways Big Data Can Help Win Your Next Case Image

Four Ways Big Data Can Help Win Your Next Case

Lauren Bakewell

Analyzing data and providing the right kind of data is critically important to every aspect of legal activities. When you're expecting data to act as a secret weapon in the sales process, the courtroom, or to provide a strong foundation for your firm, the quality of your information is priceless. To uphold your firm's integrity and ensure its success, it's time to get your staffers off Google and arm them with data intelligence.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›