Features

LJN Online Has A New Look … and Your Action Is Required
Law Journal Newsletters Online is not only getting a new look, but is now fully integrated with ALM and its other offerings.
Features

<i>CYBER-ETHICS:</i> Technological Competence Obligations and the Interplay of the ABA Model Rules and Attorney Cybersecurity
The ABA has long published its Model Rules of Professional Conduct and modifies them from time-to-time to stay current with legal and technological developments and advances. While these Model Rules are not officially binding on attorneys, they have been adopted in large part by nearly every stateand provide a guideline for attorneys across the country regarding standards of professional responsibility and ethical conduct.
Features

Beats Headphones Royalty Dispute Saga Heads to Trial
Former hedge fund manager Steven Lamar, who helped launch Dr. Dre's Beats headphones a decade ago, won the right to go to trial against the rap artist and record producer after the California Court of Appeal revived his $100 million case over unpaid royalties.
Features

WB's Takedown Notices Aimed at Entertainment Co.'s Own Websites
Critics of the DMCA got some ammunition recently, when Warner Bros. asked Google to take down hundreds of copyright-infringing websites ' only to later realize that it had included legitimate sites and some of the entertainment company's own official pages. The blunder dredges up questions about whether the current notice-and-takedown system is working for both copyright owners and service providers.
Features

Supreme Court Term Promises to Be IP Blockbuster
With four IP cases on the docket and several more knocking at the door of certiorari, the U.S. Supreme Court is poised for a banner year of patent, trademark and copyright decisions.
Features

Privacy and Security of Personal Information Collected by Benefit Plans
High profile cyberattacks and data breaches have become routine occurrences. Cyber threats are so pervasive that many privacy and security experts advise that responsible parties ' like fiduciaries of employee benefit plans ' should prepare for <i>when</i> a data breach occurs, not </i>if</i>. Plan sponsors and fiduciaries should be aware of, and address, security and privacy issues in connection with personal information.
Features

Data Breach Prevention and Information Governance Go Hand-In-Hand
Information governance has a wide range of varying definitions, depending on whom you ask. Some consider it to be an amorphous collection of policies that are difficult to translate into the real world. Others view it as a holistic strategy document, or a series of discrete, tactical projects that implement best practices in data security or storage optimization.
Features

China's Second Draft Cybersecurity Law's Expanded Data Localization Requirement
Cybersecurity has remained a priority for the Chinese government in 2016. The second draft of the Cybersecurity Law was released for public comment on July 5, 2016. Although still in draft form, when it is adopted, the Cybersecurity Law will impose a number of requirements on companies with business operations within the territory of China that have been subject to heated discussions among multinational companies (MNCs).
Features

Cybersecurity Comes Together in Legal and Finance
Since the dawn of the new millennium, technology has been expanding the reach and ability of criminals at breakneck speeds. Regulators have constantly found themselves running behind a new era of cyberthreats and dangers, struggling to respond to accidents while fortifying the road ahead.
Features

Four Ways Big Data Can Help Win Your Next Case
Analyzing data and providing the right kind of data is critically important to every aspect of legal activities. When you're expecting data to act as a secret weapon in the sales process, the courtroom, or to provide a strong foundation for your firm, the quality of your information is priceless. To uphold your firm's integrity and ensure its success, it's time to get your staffers off Google and arm them with data intelligence.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›