Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Cybersecurity Law & Strategy

Features

Constructive Exuberance: Planning for the Regulation and Enforcement of Privacy, Cybersecurity, and Advanced Technologies In 2025 Image

Constructive Exuberance: Planning for the Regulation and Enforcement of Privacy, Cybersecurity, and Advanced Technologies In 2025

Michael Bahar & Pooja Kohli & Rachel May

While change is a constant in the privacy, security and technology arena, 2025 is poised to be a landmark year. New technologies will continue to radiate through the economy — and our lives — while the new Trump Administration is likely to emphasize innovation over protection, reward maximization over risk minimization, and incentivizing over enforcing.

Features

FOIA In 2025: Beat the Backlog, Avoid Lawsuits and Reduce Cyber Risk Image

FOIA In 2025: Beat the Backlog, Avoid Lawsuits and Reduce Cyber Risk

Victoria Cash & Amy Hilbert

The Freedom of Information Act (FOIA) stands at a critical juncture heading into 2025. Federal agencies are grappling with mounting backlogs, increasingly complex data landscapes, and rising cybersecurity threats. As a new administration takes office, the urgency to adopt innovative, effective solutions has never been greater.

Features

FOIA In 2025: Beat the Backlog and Avoid Lawsuits Image

FOIA In 2025: Beat the Backlog and Avoid Lawsuits

Victoria Cash & Amy Hilbert

The Freedom of Information Act (FOIA) stands at a critical juncture heading into 2025. Federal agencies are grappling with mounting backlogs, increasingly complex data landscapes, and rising cybersecurity threats. As a new administration takes office, the urgency to adopt innovative, effective solutions has never been greater.

Features

A New Privacy Nuisance Suit Wave Gathers Strength In Arizona Image

A New Privacy Nuisance Suit Wave Gathers Strength In Arizona

Tyler Thompson

Plaintiff’s lawyers struggling to find another nuisance suit cash grab in a desert of privacy laws without a private right of action appear to have found their oasis. Like a hiker desperate for water in the Valley of the Sun, plaintiff’s firms are desperately trying to tie a little-known state law to common email tracking pixel technologies. With the potential for class-action litigation and significant financial exposure, companies relying on these technologies must reassess their risk.

Features

Planning for the Regulation and Enforcement of Privacy, Cybersecurity, and Advanced Technologies In 2025 Image

Planning for the Regulation and Enforcement of Privacy, Cybersecurity, and Advanced Technologies In 2025

Michael Bahar & Pooja Kohli & Rachel May

While change is a constant in the privacy, security and technology arena, 2025 is poised to be a landmark year. New technologies will continue to radiate through the economy — and our lives — while the new Trump Administration is likely to emphasize innovation over protection, reward maximization over risk minimization, and incentivizing over enforcing.

Features

Ruling In Music App’s Contract Breach Complaint Against Apple’s App Store Image

Ruling In Music App’s Contract Breach Complaint Against Apple’s App Store

Kat Black

A California federal court rejected music streaming platform Musi’s request for a preliminary injunction against Apple, after Apple removed the Musi app from Apple’s app store due to copyright infringement concerns.

Features

Mitigating AI Risk In Light of Increasing Regulatory and Shareholder Scrutiny Image

Mitigating AI Risk In Light of Increasing Regulatory and Shareholder Scrutiny

Cara M. Peterman & Sierra Shear & Carissa Lavin

Driven by promises of increased efficiency and innovation, companies spanning a wide variety of industries are rapidly adopting and investing in artificial intelligence (AI). The explosion of interest in AI has also spurred the attention of the SEC and private shareholder plaintiffs. Companies should continue to closely consider their public statements related to AI and implement appropriate precautions when discussing their AI initiatives.

Features

Gen Z’s Tech Familiarity Seen As Asset for Law Firm Retention and Recruiting Image

Gen Z’s Tech Familiarity Seen As Asset for Law Firm Retention and Recruiting

Jon Campisi

With a greater number of older attorneys expected to age out of the profession and succession planning earning an increased focus in the legal world, law firms will need to ramp up talent recruitment and retention, and observers envision Gen Z attorneys, with their heightened familiarity with technology, as a particularly critical asset.

Features

AI Trainers Exposed to ‘Deeply Unsettling’ Content File Suit for Unsafe Working Conditions Image

AI Trainers Exposed to ‘Deeply Unsettling’ Content File Suit for Unsafe Working Conditions

Michelle Morgante

Contract workers who say they suffered severe psychological harm by being exposed to “deeply unsettling” and traumatic scenarios used to train generative artificial intelligence models filed a class action complaint on January 17 against three Bay Area firms for alleged negligence and unsafe working conditions.

Features

In-House Lawyers Are Focused on Employment and Cybersecurity Disputes, But Looking Out for Conflict Over AI Image

In-House Lawyers Are Focused on Employment and Cybersecurity Disputes, But Looking Out for Conflict Over AI

Ross Todd

Employment and labor and cybersecurity, data protection and data privacy remain top of mind for in-house lawyers focused on litigation. Still, there’s mounting concern about the threat of large damages verdicts.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›