Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Improving Your Cybersecurity Today: 10 Tips to Take Your Firm’s Security from Good to Great Image

Improving Your Cybersecurity Today: 10 Tips to Take Your Firm’s Security from Good to Great

Karun Mahadevan & Antonio Chelala

This two-part series summarizes modern security practices as advised by NIST’s latest guidelines, a framework that prioritizes proactive, resilient and user-friendly strategies. Part One of the series, published in last month’s issue, offered 10 must-know tips to improve personal cybersecurity; Part Two shares 10 tips to take your firm or organization’s security from good to great.

Features

DOJ Regulation to Protect Americans’ Personal Data Takes Effect Image

DOJ Regulation to Protect Americans’ Personal Data Takes Effect

Matthew Baker & Nick Palmieri & Justin Bryant

In a show of continuity between administrations, the Biden-era Executive Order 14117 — designed to restrict foreign access to Americans’ most sensitive personal data — has been allowed to take effect in the second Trump administration.The Department of Justice’s implementing regulation for this Order, finalized in late December 2024, became enforceable in April 2025.

Features

A Critical Leap Forward: How AI and Open-Source Intelligence Are Redefining Risk in Legal Operations Image

A Critical Leap Forward: How AI and Open-Source Intelligence Are Redefining Risk in Legal Operations

Matt Winlaw

In today’s digital-first business environment, legal departments are confronting an unprecedented escalation of risk. Cyberattacks are growing more frequent and sophisticated. Regulatory complexity is expanding across jurisdictions. And the pressure to respond quickly — without compromising accuracy or trust — is mounting.

Features

Know Your Data: Why AI-Driven Information Governance Is Essential Image

Know Your Data: Why AI-Driven Information Governance Is Essential

Brandon Hollinder

The wave of cyberattacks and data breaches has turned information governance from a compliance afterthought into a required business function. Yet, despite well-publicized threats and skyrocketing costs associated with cyber incidents, most companies remain both underinsured and fundamentally underprepared.

Features

Improving Your Cybersecurity Today: 10 Must-Know Tips to Reduce Personal Risk Image

Improving Your Cybersecurity Today: 10 Must-Know Tips to Reduce Personal Risk

Karun Mahadevan & Antonio Chelala

In the modern digital landscape, both personal and organizational cybersecurity are more critical than ever. This two-part series summarizes modern security practices as advised by the National Institute of Standards and Technology’s latest guidelines, a framework that prioritizes proactive, resilient and user-friendly strategies. Part one of the series offers 10 must-know tips for personal cybersecurity. Part Two will share 10 tips to take your firm/organization’s security from good to great.

Features

Back to the Future: How Data Privacy Laws Can Teach Us What to Expect With AI Regulation Image

Back to the Future: How Data Privacy Laws Can Teach Us What to Expect With AI Regulation

Ryan Steidl

While the amount of AI legislation introduced in various states is relatively limited, the scope of issues being legislated is quite broad. Despite the many uncertainties that remain to be clarified, there are actually many parallels between how data privacy laws took shape five years ago, and how AI legislation is developing today.

Features

Spurred By Data Breaches, CLOs Are Increasing Cybersecurity Leadership Role Image

Spurred By Data Breaches, CLOs Are Increasing Cybersecurity Leadership Role

Chris O'Malley

Chief information officers still bear the brunt of cybersecurity worries at many companies. But a study by the Association of Corporate Counsel Foundation finds that chief legal officers are increasingly taking a leadership role in cybersecurity strategy.

Features

Shifting Crypto and Cyber Priorities In SEC Enforcement Image

Shifting Crypto and Cyber Priorities In SEC Enforcement

Alec Koch & Carmen Lawrence & Aaron Lipson & Bill Johnson

When the SEC issues the next annual enforcement report for fiscal year 2025, we expect securities offering actions and investment adviser actions will almost certainly be up, and the “crypto” and “cyber” cases will almost certainly be down. Public statements by the new SEC administration have said as much, but even more telling than public statements are the allocation of limited enforcement resources.

Features

Recognizing and Combatting Online ‘Dark Patterns’ Image

Recognizing and Combatting Online ‘Dark Patterns’

Peter Brown

As online platforms become more sophisticated, so do the tactics designed to manipulate user behavior. Among these, “dark patterns” have emerged as a particularly concerning phenomenon. This article explores the different types of dark patterns prevalent online, examines how they affect consumers and businesses, and analyzes the legal frameworks emerging to combat these practices in Connecticut the EU.

Features

Constructive Exuberance: Planning for the Regulation and Enforcement of Privacy, Cybersecurity, and Advanced Technologies In 2025 Image

Constructive Exuberance: Planning for the Regulation and Enforcement of Privacy, Cybersecurity, and Advanced Technologies In 2025

Michael Bahar & Pooja Kohli & Rachel May

While change is a constant in the privacy, security and technology arena, 2025 is poised to be a landmark year. New technologies will continue to radiate through the economy — and our lives — while the new Trump Administration is likely to emphasize innovation over protection, reward maximization over risk minimization, and incentivizing over enforcing.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The 'Sophisticated Insured' Defense
    A majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.
    Read More ›
  • Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric Code
    In an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.
    Read More ›