Features
Privacy and Security of Personal Information Collected by Employee Benefit Plans
High profile cyberattacks and data breaches have become routine occurrences. Cyber threats are so pervasive that many privacy and security experts advise that responsible parties ' like fiduciaries of employee benefit plans ' should prepare for <i>when</i> a data breach occurs, not <i>if</i>. Data collected by employee benefit plans includes sensitive information that makes them a particularly attractive target for cybercrime.
Features
Cybersecurity Beyond Traditional Risk Management
At a recent CIO panel, an audience member asked the three of us on stage: "What do you see as your number one priority in the coming 12 months?" I responded "cybersecurity" without hesitation. The panelist that followed said that cybersecurity was a priority, but that it is a subset of risk management. This was not the first time I have heard the chief information pro and/or technologist in a large company make that point, and I have to respectfully disagree.
Features
Online e-Discovery Ethics
Although attorneys are rapidly becoming familiar with structuring digital data requests and responding to those requests in a way that is thorough, but reasonable, most attorneys feel at sea in the e-discovery ethics arena.
Columns & Departments
Movers & Shakers
A Collection of Moves in the Cybersecurity and Privacy Practice Areas
Features
<i>Pok'mon Go</i> Raises a Variety of Liability Issues
Every generation has its own new fads, which can sweep across the country, if not the world, seemingly from nowhere, capturing the imagination and attention of millions. With the exception of a few fads, these activities, however brilliant or mindless, do not create legal issues and potential litigation involving those who participate. <i>Pok'mon Go</i> is one of those exceptions.
Columns & Departments
cyberSecure Conference
ALM's cyberSecure conference takes place Sept. 27-28 in New York. ALM cyberSecure is designed to provide business executives with the necessary tools to build and deploy a successful adaptive cybersecurity plan that comprehensively addresses detection, defense and response.
Features
How to Understand and Protect the Data in Your Enterprise
Especially in a time where cybersecurity remains in the headlines on a regular basis, it's crucial to understand what data exists in order to protect it. Where's your data? What if you lost track of some of it? What if attackers copied it?
Columns & Departments
<b><i>Legal Tech:</b></i> Modernizing Litigation Practice: What Can the U.S. Learn from Electronic Courtrooms and Paperless Trials Abroad?
Legal professionals interested in the next wave of innovation in litigation technology can look overseas to the developments over the last several years in the UK and Singapore.
Features
Five Steps to a Successful Social Media Strategy
Have you heard? Social media is mainstream ' 70% of the U.S.are using social media and more than 50% of them are over the age of 35 (that's right ' it's not just millennials). But did you know that in-house counsel are active social media participants? In fact, their usage is growing and today nearly two-thirds of general counsel (GCs) are engaging at least weekly in social media for professional reasons.
Features
Contracting With a Fintech Company
Your favorite internal client has just messaged you about a new contract that needs a rush review. The counterparty is reportedly one of the hottest new "fintech" companies in Silicon Valley. You are the master of all things vendor contract-related in your shop, but perhaps this is the first fintech contract to cross your desk. This article addresses some of the special issues that might be presented by this sort of contract.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- When Is a Repair Structural or Nonstructural Under a Commercial Lease?A common question that commercial landlords and tenants face is which of them is responsible for a repair to the subject premises. These disputes often center on whether the repair is "structural" or "nonstructural."Read More ›
- Beach Boys Songs Written Decades Ago Triggered Current Quarrel With LawyersThere's current litigation in the ongoing Beach Boys litigation saga. A lawsuit filed in 2019 against Nevada residents Mike Love and his wife Jacquelyne in the U.S. District Court for the District of Nevada that alleges inaccurate payment by the Loves under the retainer agreement and seeks $84.5 million in damages.Read More ›
- Artist Challenges Copyright Office Refusal to Register Award-Winning AI-Assisted WorkCopyright law has long struggled to keep pace with advances in technology, and the debate around the copyrightability of AI-assisted works is no exception. At issue is the human authorship requirement: the principle that a work must have a human author to be eligible for copyright protection. While the Copyright Office has previously cited this "bedrock requirement of copyright" to reject registrations, recent decisions have focused on the role of human authorship in the context of AI.Read More ›
- Supreme Court Rules Rejection of Trademark License Does Not Rescind Rights of LicenseeMission Product Holdings, Inc. v. Tempnology, LLC The question is whether a debtor's rejection of its agreement granting a license "terminates rights of the licensee that would survive the licensor's breach under applicable nonbankruptcy law."Read More ›
- Recently Introduced Bill Would Limit ITC 'Domestic Industry by Subpoena'Patent infringement disputes in the United States are not only heard in district courts. The U.S. International Trade Commission (ITC) also decides high-stakes intellectual property disputes — with the remedy for the IP rights holder not being damages, but rather an exclusion order that can block a competitor's importation of infringing articles into the U.S. That remedy can be incredibly powerful for companies engaged in stiff competition in the U.S. market.Read More ›