Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

The EU AI Act Will Transform Practices for AI Governance In the U.S. Image

The EU AI Act Will Transform Practices for AI Governance In the U.S.

Dominique Shelton Leipzig

The EU AI Act solidifies one of the world's first comprehensive attempts to bring governance to unlock innovation in AI. U.S. companies have asked, what exactly does this development mean for their businesses?

Features

The Importance of Cyber Vigilance: Control Liability and Litigation Exposure Image

The Importance of Cyber Vigilance: Control Liability and Litigation Exposure

Brandon Hollinder

This article covers cyber trends and tips for organizations to explore in order to be better equipped to anticipate and respond to cyber incidents before a devastating breach occurs. The outcome? Diminished chance of class action activity, compliance violations, lost business, and mounting costs.

Features

Happy Anniversary ChatGPT! Leveraging Generative Artificial Intelligence in Your Law Firm Practice One Year into this Disruptive Technology Phenomenon Image

Happy Anniversary ChatGPT! Leveraging Generative Artificial Intelligence in Your Law Firm Practice One Year into this Disruptive Technology Phenomenon

Joy Holley

While the societal impact of technology is not a new concept, GenAI stands out due to its accessibility to the public and its profound influence on knowledge-based industries like law. In addition to boosting efficiency and productivity, GenAI's new technological capabilities hold the promise of empowering lawyers to offer more precise and insightful guidance to their clients.

Features

The Cyber Shot Across the Bow: Data Manipulation and GPS Spoofing Image

The Cyber Shot Across the Bow: Data Manipulation and GPS Spoofing

Michael Bahar, Bronwyn McDermott & Trevor J. Satnick

In September 2015, then-Director of National Intelligence James Clapper warned that the next "push of the envelope" in cybersecurity might be attacks that change or manipulate electronic information in order to compromise its accuracy or reliability. Two years later, we may now be seeing the beginning of such insidious attacks, in the context of GPS spoofing — a technique that sends false signals to systems that use GPS signals for navigation.

Features

Vendor Contracting for Privacy and Security Image

Vendor Contracting for Privacy and Security

Chuck Kunz & Ian McCauley

In an effort to continue to capture ongoing and new business, vendors may be opening themselves up to liability due to poorly drafted contracts with companies. In addition, in a rush by companies to have data shifted to the cloud, privacy concerns may be dangerously minimized.

Features

<i><b>BREAKING NEWS</i></b><br>DLA Piper Hit by Cyber Attack, Phones and Computers Down Across the Firm Image

<i><b>BREAKING NEWS</i></b><br>DLA Piper Hit by Cyber Attack, Phones and Computers Down Across the Firm

James Booth

The shutdown appears to have been caused by a ransomware attack, similar to the WannaCry attack that hit organizations such as the NHS last month.

Features

The State of Data Breach Litigation and How to Avoid It Image

The State of Data Breach Litigation and How to Avoid It

Aaron D. Charfoos & Sean C. Griffin

The number of records compromised in data breaches in 2016 increased an astounding 86% over 2015 breaches. This has led to numerous data breach litigations in the civil and regulatory context. What are the major cases and trends from 2016? And what can organizations do to try to reduce their risks of breaches and litigations?

Features

Using Computer Forensics to Investigate Employee Data Theft Image

Using Computer Forensics to Investigate Employee Data Theft

Timothy M. Opsitnick, Joseph M. Anguilano & Trevor B. Tucker

When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft-of-IP analysis in order to preserve electronic data and uncover important evidence.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES