Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

While Federal Legislation Flounders, State Privacy Laws for Children and Teens Gain Momentum Image

While Federal Legislation Flounders, State Privacy Laws for Children and Teens Gain Momentum

Kandi Parsons & Jon Frankel & Rushil Mehta

For decades, the Children’s Online Privacy Protection Act has been the only law to expressly address privacy for minors’ information other than student data. In the absence of more robust federal requirements, states are stepping in to regulate not only the processing of all minors’ data, but also online platforms used by teens and children.

Features

Constructive Exuberance: Planning for the Regulation and Enforcement of Privacy, Cybersecurity, and Advanced Technologies In 2025 Image

Constructive Exuberance: Planning for the Regulation and Enforcement of Privacy, Cybersecurity, and Advanced Technologies In 2025

Michael Bahar & Pooja Kohli & Rachel May

While change is a constant in the privacy, security and technology arena, 2025 is poised to be a landmark year. New technologies will continue to radiate through the economy — and our lives — while the new Trump Administration is likely to emphasize innovation over protection, reward maximization over risk minimization, and incentivizing over enforcing.

Features

Navigating AI Risks: Best Practices for Compliance and Security Image

Navigating AI Risks: Best Practices for Compliance and Security

Henry Umney

The most forward-thinking companies embrace AI with complete confidence because they have created governance programs that serve as guardrails for this incredible new technology. Effective governance ensures AI consistently aligns with an organization’s best interests, safeguarding against potential risks while unlocking its full potential.

Features

AI Poisoning: A Self Help Cybersecurity Option Image

AI Poisoning: A Self Help Cybersecurity Option

Jonathan Bick

A novel legal self-help technique to secure artificial intelligence data and programs is known as Poisoning AI. This technique involves modifying the AI algorithm to intentionally produce specific erroneous results.

Features

How Secure Is the AI System Your Law Firm Is Using? Image

How Secure Is the AI System Your Law Firm Is Using?

Melissa "Rogo" Rogozinski

In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.

Features

Generative AI and the 2024 Elections: Risks, Realities, and Lessons for Businesses Image

Generative AI and the 2024 Elections: Risks, Realities, and Lessons for Businesses

George Vlatso & Joshua Tucker

GenAI's ability to produce highly sophisticated and convincing content at a fraction of the previous cost has raised fears that it could amplify misinformation. The dissemination of fake audio, images and text could reshape how voters perceive candidates and parties. Businesses, too, face challenges in managing their reputations and navigating this new terrain of manipulated content.

Features

Hyperlinked Documents: The Latest e-Discovery Challenge Image

Hyperlinked Documents: The Latest e-Discovery Challenge

Ryan Hemmel & Luke Groth

As courts and discovery experts debate whether hyperlinked content should be treated the same as traditional attachments, legal practitioners are grappling with the technical and legal complexities of collecting, analyzing and reviewing these documents in real-world cases.

Features

DOJ's Cyber Fraud Initiative Is a Wake-Up Call That Keeps Ringing Image

DOJ's Cyber Fraud Initiative Is a Wake-Up Call That Keeps Ringing

Randy S. Grossman, Kareem A. Salem & Kayla LaRosa

The DOJ's Cyber-Fraud Initiative's results and DOJ's guidance on corporate compliance have made the point to government contractors and corporate America — "now is the time to invest and reinvest" in cybersecurity compliance.

Features

Are You For Real? Dealing with the Proliferation of Deepfakes Image

Are You For Real? Dealing with the Proliferation of Deepfakes

Matt White

Notwithstanding the significant threats facing companies as a result of deepfake technology, there are several things companies can do to protect themselves and their employees from becoming the victim of a deepfake scam.

Features

China Finalizes New Regulations to Relax Personal Data Exports from China Image

China Finalizes New Regulations to Relax Personal Data Exports from China

Lindsay Zhu, Scott Warren, Haowen Xu & Charmian Aw

Nearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES