Features
More than Just a Purchase, a Partnership: Tips for Success with Cloud-based Practice Management In 2022
While functionality and features are important, there are a number of additional considerations when evaluating a practice management solution. Will your platform provider serve as a partner that will offer expert guidance and be invested in your ongoing success?
Features
Predicting What 2022 Holds for Cybersecurity
Predictions aside, complacency is not an option if you plan to survive and thrive in 2022. Rest assured, the future of cybersecurity is bright, but it will come with its own set of challenges. We look forward into the future because the sooner we can start adapting strategy, policies, and technologies, the better off everyone will be in the long run.
Features
Biometric Privacy: A Year In Review (2021) and The Year Ahead (2022)
The year started with Portland, Oregon's ban on the use of facial recognition technology by private entities in places of "public" accommodation. It concluded with the rendering of important appellate decisions on the Illinois Biometric Information Privacy Act. In the middle, was the continued flurry of litigation, class action settlements, and legislative activity.
Features
Cybersecurity and Legal Tech In 2022: Predictions from the Field
It's still a dangerous cyber world as we enter 2022, but one that today's attorneys and legal technologists are prepared to tackle. Here's what they predict for cybersecurity, remote work, privacy and e-discovery in the new year.
Features
Cybersecurity and Corporate Privacy Enforcement Is Focus of Feds
It started as a hushed rumor in the beltway, then became a known fact by those going to join the administration. And now we all know: The Biden administration has brought with it a renewed focus on data privacy and cybersecurity.
Features
'Never Trust, Always Verify': Zero Trust Security
Recognizing the ever-increasing cyber threats to businesses, government entities, and individuals, the White House announced that Federal Civilian Executive Branch agencies must migrate toward Zero Trust Cybersecurity Architecture by September 2024. Under Zero Trust, trust is the ultimate vulnerability of any system and, therefore, trust has to be eliminated from a business' cybersecurity approach.
Features
Protecting a Website's Legal Identity
Protecting an internet site's legal identity begins with the settled proposition that domain names are a form of personal property. The classification of a domain name as property allows the owner to register the domain name with the United States Trademark Office. Additionally, a domain name owner may state a claim for conversion against an entity that unlawfully interferes with the domain name property.
Features
Analyzing the Impact of the Many New Rules of Cybersecurity
New cybersecurity and data protection federal regulations, directives and guidelines as well as new case law, industry-specific guidelines and new state laws that, when taken together, form an industry standard applicable to almost all business sectors
Features
Where Does Content Use Stand Now After Recent Rulings on 'Embedding' Foreshadow Circuit Split?
When and how can you display someone else's visual content on your website without running afoul of copyright law? When and how can someone else display your visual content? A recent ruling out of the Southern District of New York may upend the current paradigm.
Features
In a Year of the Great Resignation, Corporations Need to Prepare for the Great Investigation
Even before this Great Resignation movement, corporations across the globe were reporting increases in suspicious activity, data leakage, IP theft and other data risks stemming from departing employees and remote workers. And now, with more employees having exited and the Great Resignation seeming to accelerate further, existing data and risk implications are likely to be compounded.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- The Binding Effect of Plea Agreements In White Collar CrimesFederal plea agreements sometimes state explicitly that they are limited to that one office and do not bind other U.S. attorney's offices. In this article, we discuss the circuit courts' competing approaches to interpreting the binding effect of plea agreements and the Department of Justice policy.Read More ›
- Authentic Communications Today Increase Success for Value-Driven ClientsAs the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›