Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Information technology security is a critical issue for all law firms. Yet, security initiatives are often dismissed as high cost/low return and put on the back burner. This low priority status persists despite the significant operational and financial impact a security breach would have on a firm. It is only when a major event such as the recent confluence of the Northeast blackout and the Blaster and SoBig worm attacks, or the nefarious actions of a disgruntled employee hit the public consciousness that attention rapidly re-focuses on security matters.
As the practice of law is perhaps the most information intensive of professions, we cannot avoid the implications of the digital age. The use of information technology in law firms has risen to the point where systems and technology serve as the nervous system of the firm. Loss of critical information systems and services could put the firm on life support. Even a thumbnail calculation on the financial impact of a security event that damaged systems and services would disclose a sizeable cost in terms of lost revenue, lost productivity, recovery costs and loss of client confidence.
In simple terms, if a firm loses its information systems for an extended period, it may be out of business. With this much riding on the availability of information technology, IT security is truly a now or never proposition.
This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
In Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?