Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
If you follow the legal technology headlines you might have noticed that we've come full circle on cloud security. Rewind seven or so years, and mainstream cloud computing adoption was being thwarted by grave concerns about data security, data governance and data access. As the cloud became more pervasive in many industries globally, the legal market took note and slowly but surely more law firms went to the cloud. Thanks to persistent market education and the realization that cloud benefits ' such as flexibility, cost savings, mobility/accessibility and resource savings ' outweighed potential security issues, the legal cloud gained momentum. As security concerns became more pronounced and difficult to effectively address in-house, law firm CIOs and information governance leaders realized that reputable cloud providers were much better positioned to tackle security.
Fast forward to 2016. Security is still a major concern. The 2015 ILTA/InsideLegal Technology Purchasing Survey cited security as the top challenge facing legal IT leaders, including concerns about providing a secure environment for information and file sharing in the cloud. Law firm clients are now demanding their outside counsel complete regular security audits, with global firms routinely being audited in the double digits. Protecting a firm's IP and work product is increasingly important to corporate clients, especially in regulated industries.
One huge realization for law firms is that with a very well-built cloud computing model, security can be much more ironclad than they can afford to implement in-house. Compliance and security, far from driving people away from the cloud, are moving them into it because the defenses, encryption technologies and security certifications maintained by cloud providers far exceed what most firms are capable of installing and maintaining on-premise or in a hosted model.
This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
In Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?
The copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.