Features
Privacy and Security of Personal Information Collected by Employee Benefit Plans
High profile cyberattacks and data breaches have become routine occurrences. Cyber threats are so pervasive that many privacy and security experts advise that responsible parties ' like fiduciaries of employee benefit plans ' should prepare for <i>when</i> a data breach occurs, not <i>if</i>. Data collected by employee benefit plans includes sensitive information that makes them a particularly attractive target for cybercrime.
Features
Cybersecurity Beyond Traditional Risk Management
At a recent CIO panel, an audience member asked the three of us on stage: "What do you see as your number one priority in the coming 12 months?" I responded "cybersecurity" without hesitation. The panelist that followed said that cybersecurity was a priority, but that it is a subset of risk management. This was not the first time I have heard the chief information pro and/or technologist in a large company make that point, and I have to respectfully disagree.
Features
Online e-Discovery Ethics
Although attorneys are rapidly becoming familiar with structuring digital data requests and responding to those requests in a way that is thorough, but reasonable, most attorneys feel at sea in the e-discovery ethics arena.
Columns & Departments
Movers & Shakers
A Collection of Moves in the Cybersecurity and Privacy Practice Areas
Features
<i>Pok'mon Go</i> Raises a Variety of Liability Issues
Every generation has its own new fads, which can sweep across the country, if not the world, seemingly from nowhere, capturing the imagination and attention of millions. With the exception of a few fads, these activities, however brilliant or mindless, do not create legal issues and potential litigation involving those who participate. <i>Pok'mon Go</i> is one of those exceptions.
Columns & Departments
cyberSecure Conference
ALM's cyberSecure conference takes place Sept. 27-28 in New York. ALM cyberSecure is designed to provide business executives with the necessary tools to build and deploy a successful adaptive cybersecurity plan that comprehensively addresses detection, defense and response.
Features
How to Understand and Protect the Data in Your Enterprise
Especially in a time where cybersecurity remains in the headlines on a regular basis, it's crucial to understand what data exists in order to protect it. Where's your data? What if you lost track of some of it? What if attackers copied it?
Columns & Departments
<b><i>Legal Tech:</b></i> Modernizing Litigation Practice: What Can the U.S. Learn from Electronic Courtrooms and Paperless Trials Abroad?
Legal professionals interested in the next wave of innovation in litigation technology can look overseas to the developments over the last several years in the UK and Singapore.
Features
Five Steps to a Successful Social Media Strategy
Have you heard? Social media is mainstream ' 70% of the U.S.are using social media and more than 50% of them are over the age of 35 (that's right ' it's not just millennials). But did you know that in-house counsel are active social media participants? In fact, their usage is growing and today nearly two-thirds of general counsel (GCs) are engaging at least weekly in social media for professional reasons.
Features
Contracting With a Fintech Company
Your favorite internal client has just messaged you about a new contract that needs a rush review. The counterparty is reportedly one of the hottest new "fintech" companies in Silicon Valley. You are the master of all things vendor contract-related in your shop, but perhaps this is the first fintech contract to cross your desk. This article addresses some of the special issues that might be presented by this sort of contract.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›