Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Pitfalls In Personal Device Data Collection Image

Pitfalls In Personal Device Data Collection

Marjorie Peerce & Marguerite O'Brien

The increasing frequency of "bring your own device" policies creates serious implications for subpoena recipients and litigants to ensure compliance with discovery demands. And courts across the country consider such personal mobile data fair game. To avoid pitfalls —and sanctions — counsel must take proactive steps to ensure proper preservation and collection of personal mobile data and verify that clients comply.

Features

Washington My Health My Data Act FAQs: Data Subject Rights Image

Washington My Health My Data Act FAQs: Data Subject Rights

Amy de La Lama & Andrea Rastelli

Like so many other features of the MHMDA, data subject rights are deceptively complicated and have the potential to create significant administrative hurdles to getting it right. In this article, we examine the tricky issues in our MHMDA FAQs and take a deep dive into data subject rights.

Features

Programmers Liability for Alleged Rights Violations Caused By AI Software Image

Programmers Liability for Alleged Rights Violations Caused By AI Software

Jonathan Bick

AI is designed to accomplish goals specified by and receive directions from a human being. Thus, it has been suggested that either direct or vicarious liability may be applied to hold the human programmer who wrote the software algorithms liable for the damages caused by the AI agent.

Features

Determining Ownership Rights of Social Media Accounts Image

Determining Ownership Rights of Social Media Accounts

Dyan Finguerra-DuCharme, Felicity Kohn & Abla Belhachmi

This article provides guidance on the standards courts apply in determining ownership rights over social media accounts, as well as best practices to head off such disputes before they occur.

Features

What Employers Need to Know About Employee Privacy Image

What Employers Need to Know About Employee Privacy

Lisa Gingeleskie

Many employers struggle with not only identifying what is private protectable information, but also how to safeguard that information while also protecting the company's own business interests. Given the increased costs of litigation, it is critical that employers understand their obligations under the law and how to strike a legally compliant balance between these competing interests.

Features

Law Firms' Pressing AI Questions Image

Law Firms' Pressing AI Questions

Cassandre Coyer

Most of the legal industry has by now boarded the generative artificial intelligence train, filling up conference sessions dedicated to the topic, testing new legal technology solutions and exploring the emerging legal questions that the technology will pose. But most of their questions about generative AI are still unanswered.

Features

U.S. Regulators Lift the Curtain on Data Practices with Assessment, Reporting and Audit Requirements Image

U.S. Regulators Lift the Curtain on Data Practices with Assessment, Reporting and Audit Requirements

Alan Friel, David Manek, Sasha Kiosse, David Farber & Colleen M. Yushchak

The assessment and audit requirements of the new generation of state data protection laws will force U.S. companies to move beyond mere window dressing and instead require them to develop fulsome data protection programs.

Features

Artificial Intelligence Redefines Our Defense Against Cyber Threats Image

Artificial Intelligence Redefines Our Defense Against Cyber Threats

Roy Hadley

The cybersecurity landscape is on the brink of a transformative shift, with predictive analytics and behavioral analysis leading the charge for more resilient and adaptive defenses.

Features

Deep Fake of CFO on Videocall Used to Defraud Company of $25M Image

Deep Fake of CFO on Videocall Used to Defraud Company of $25M

Scott Warren

Hackers are using AI to sift large digital data to identify more convincing approaches for their scams as well as weaknesses in weaknesses in software coding or network security.

Features

5 Expert Cybersecurity Steps to Take in 2024 Image

5 Expert Cybersecurity Steps to Take in 2024

Luke Tenery

As many CISOs and cyber teams think about the year ahead, and legal professionals consider the far-reaching consequences of cybersecurity, here is a checklist to help them prepare for the biggest cybersecurity trends to come.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES