Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Security Breach Responses — As Important and Difficult As Ever Image

Security Breach Responses — As Important and Difficult As Ever

Bart A. Lazar

The confusing and conflicting world of contractual requirements and personal data security breach notification laws can add insult and expense to injury, and sometimes adds injury itself. Tough -- and sometimes expensive -- choices need to be made quickly.

Features

Protecting Privilege Before and After a Cyber Breach Image

Protecting Privilege Before and After a Cyber Breach

Robert W. Anderson & Eric B. Levine

Critical to any counsel working to prevent a cyber-attack or respond to a successful cyber intrusion is an understanding why and how to properly utilize both attorney-client and work-product privilege. The overriding principle of using privilege is straightforward: to protect your organization's investigation and breach response efforts from usage by third parties or regulatory agencies in litigation arising from a breach.

Features

This is Not Your Father's Cloud Image

This is Not Your Father's Cloud

Adam Cohen

<b><i>Part One of a Two-Part Article</b></i><p>Part One of this two-part article is aimed at demystifying the hesitations behind cloud security and analyzing the fast-growing transformation to a range of newer technical approaches with important consequences for legal practice.

Features

How Cyber Threats Affect Law Firm Marketers Image

How Cyber Threats Affect Law Firm Marketers

Melanie Trudeau

Even though law firms don't generally manage retail-type websites, they are far from immune to cyber threats. In fact, firms are prime targets for cyber criminals.

Features

The Power of Certifications in Legal Image

The Power of Certifications in Legal

Jared Coseglia

<b><i>Part Two of a Two-Part Article</b></i><p>Professionals in e-discovery and privacy, including lawyers, are hungry for growth opportunities and may be ripe to transition into certain security-centric positions; however, the security job landscape is far more expansive and far less commoditized than ESI or privacy — for now. Part Two provides a road map for how certifications can assist an individual or an organization in reinventing, repurposing, creating or maintaining cybersecurity talents.

Features

Navigating the Fear and Promise of Artificial Intelligence Image

Navigating the Fear and Promise of Artificial Intelligence

Jeff Reihl & Rick McFarland

With the corpus of law data becoming ever-more complex and nuanced, the use of machine-assisted research and analysis is becoming more of a requirement, rather than an option, in the legal profession. Because of this, some have expressed fear that robot-lawyers will replace legal professionals.

Features

Online Extra: The Evolving Nature of Cyber Law Image

Online Extra: The Evolving Nature of Cyber Law

Gabrielle Orum Hernández

<b><i>A Q&A with Penn Law Prof. Anne Toomey McKenna</b></i><p>The newly appointed Penn State professor sees a lot of room for questions in the evolving cyber law landscape, but so far there are few answers.

Features

Online Extra: Facebook's Blockchain Bet Could Place It in the Data Decentralization Debate Image

Online Extra: Facebook's Blockchain Bet Could Place It in the Data Decentralization Debate

Ian Lopez

<i><b>Oft-Considered an Avenue for Individuals to Attain Greater Control over Their Digital Information, Blockchain Could Be Leveraged By Facebook to Change Its Status As “Gatekeeper” for User Data</i></b><p>Facebook Inc. recently announced that it will begin exploring different ways to incorporate blockchain into its infrastructure. Yet, questions remain over how the social media company will implement the technology and what sort of legal challenges doing so could portend.

Features

Legal Tech: E-Discovery Case Digest Image

Legal Tech: E-Discovery Case Digest

Mike Hamilton

A look at key court rulings on e-discovery matters from the winter of 2017-18.

Features

Georgia Gov. Deals a Blow to Controversial Cybersecurity Bill Image

Georgia Gov. Deals a Blow to Controversial Cybersecurity Bill

Gabrielle Orum Hernández

Gov. Nathan Deal opted to veto a cybersecurity bill criticized by technology groups that would have made “unauthorized computer access” a crime.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES