Features

Constructive Exuberance: Planning for the Regulation and Enforcement of Privacy, Cybersecurity, and Advanced Technologies In 2025
While change is a constant in the privacy, security and technology arena, 2025 is poised to be a landmark year. New technologies will continue to radiate through the economy — and our lives — while the new Trump Administration is likely to emphasize innovation over protection, reward maximization over risk minimization, and incentivizing over enforcing.
Features

Navigating AI Risks: Best Practices for Compliance and Security
The most forward-thinking companies embrace AI with complete confidence because they have created governance programs that serve as guardrails for this incredible new technology. Effective governance ensures AI consistently aligns with an organization’s best interests, safeguarding against potential risks while unlocking its full potential.
Features

AI Poisoning: A Self Help Cybersecurity Option
A novel legal self-help technique to secure artificial intelligence data and programs is known as Poisoning AI. This technique involves modifying the AI algorithm to intentionally produce specific erroneous results.
Features

How Secure Is the AI System Your Law Firm Is Using?
In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
Features

Generative AI and the 2024 Elections: Risks, Realities, and Lessons for Businesses
GenAI's ability to produce highly sophisticated and convincing content at a fraction of the previous cost has raised fears that it could amplify misinformation. The dissemination of fake audio, images and text could reshape how voters perceive candidates and parties. Businesses, too, face challenges in managing their reputations and navigating this new terrain of manipulated content.
Features

Hyperlinked Documents: The Latest e-Discovery Challenge
As courts and discovery experts debate whether hyperlinked content should be treated the same as traditional attachments, legal practitioners are grappling with the technical and legal complexities of collecting, analyzing and reviewing these documents in real-world cases.
Features

DOJ's Cyber Fraud Initiative Is a Wake-Up Call That Keeps Ringing
The DOJ's Cyber-Fraud Initiative's results and DOJ's guidance on corporate compliance have made the point to government contractors and corporate America — "now is the time to invest and reinvest" in cybersecurity compliance.
Features

Are You For Real? Dealing with the Proliferation of Deepfakes
Notwithstanding the significant threats facing companies as a result of deepfake technology, there are several things companies can do to protect themselves and their employees from becoming the victim of a deepfake scam.
Features

China Finalizes New Regulations to Relax Personal Data Exports from China
Nearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.
Features

Privacy Risk Management & Data Minimization
Many organizations — from growing start-ups to mature, well-established companies — are struggling with the new reality of what it means to manage data in an era of digital transformation, exponential data growth, and expanding regulatory regimes focusing on data management and minimization.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- The 'New NAFTA' and How It Will Affect Intellectual Property LawThe stage is set for the 24-year-old north American Free Trade Agreement (NAFTA) to end and the U.S. Mexico Canada Agreement (USMCA), which has implications for intellectual property, to take its place.Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›