Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
In recent studies conducted by e-mail analyst firm Radicati, 97% of business people surveyed were aware that e-mail is insecure. More than two thirds of those surveyed worry about the privacy of e-mail, and the same number agree that they would use e-mail to send confidential information if they had access to e-mail encryption technology.
E-mail Interception and Tampering
Fifteen years ago, when lawyers first started to communicate with clients, the head of IT for law firms small and large warned of the dangers of e-mail. E-mail travels from the sender to the receiver as a virtual postcard, and as e-mail is stored and forwarded through the Internet, there is a real risk that someone other than the sender or the intended receiver can intercept and either read it or tamper with it. Attorney-client privilege, liability for breach of confidentiality obligations and damage to a firm's reputation were all reasons originally cited for stopping the use of e-mail at law firms before it even started. Convenience and responsiveness to clients became justification enough to ignore the basic issue that e-mail was inherently insecure. The standard form disclaimer that we now see at the end of every lawyer's e-mail became the solution to protecting the confidential nature of attorney-client communications. Is it sufficient today?
This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
In Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?