Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

The Challenge of Complying with China's New Cybersecurity Law Image

The Challenge of Complying with China's New Cybersecurity Law

Dan Whitaker

In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. The law is set to go into effect June 1, 2017. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.

Features

The Top-Five Critical Security Controls to Consider for Corporate Counsel Evaluations Image

The Top-Five Critical Security Controls to Consider for Corporate Counsel Evaluations

Joe Kelly

Corporations consider many different factors when deciding whether to hire a law firm. Security wasn't usually a major factor, and law firms used to fly under the radar when it came to questions about keeping client data secure. That has all changed.

Features

The GDPR: Teeth, and Considerations for Corporate Legal Counsel and Discovery Teams Image

The GDPR: Teeth, and Considerations for Corporate Legal Counsel and Discovery Teams

Ryan Costello

With the EU's General Data Protection Regulation (GDPR) set to take effect in May of 2018, the serious implications for corporate legal counsel and e-discovery teams are difficult to deny.

Features

Where Is the Digital-Age Sweet Spot Between Business Growth and Data Security? Image

Where Is the Digital-Age Sweet Spot Between Business Growth and Data Security?

Sanjiv Bawa

In this heady atmosphere, law firms risk succumbing to the temptation — indeed, the seeming necessity — to exploit to the hilt the Internet's huge upside — its massive growth and profit potential — while neglecting its huge downside: its immense threats to data security.

Features

New Data Types in the App Age Image

New Data Types in the App Age

Tim Anderson & JR Jenkins

While the threat of "big data" has cast a shadow over IT and legal departments for several years, the real challenge can often be the variety. The authors believe the real challenge is less about "big data" and more about "new data types" — that quickly defeat traditional collection and review tools and strategies.

Features

Future Shock? Uncertainty over Long-Term Effects of the FCC Privacy Rules Repeal Image

Future Shock? Uncertainty over Long-Term Effects of the FCC Privacy Rules Repeal

Rhys Dipshan

<b><i>The Repeal May Open Up ISPs to Future Legal Challenges on How and When They Can Sell Their Customer's Private Data</b></i><p>While the recent repeal of the Federal Communications Commissions' (FCC) broadband privacy rules have caused an uproar over what many may see as lagging federal data privacy protections, it does little to change how broadband ISPs handle their users' data.

Features

<b><i>Legal Tech: e-Discovery</b></i><br> <b><i>Solo v. United Parcel Services</b></i>: A Conversation About Proportionality Image

<b><i>Legal Tech: e-Discovery</b></i><br> <b><i>Solo v. United Parcel Services</b></i>: A Conversation About Proportionality

Mike Hamilton

Three leading e-discovery industry thought-leaders recap some of the latest case-law and provide their takeaways.

Features

The Growing Convergence of Cyber-Related Crime and Suspicious Activity Reporting Image

The Growing Convergence of Cyber-Related Crime and Suspicious Activity Reporting

Marjorie J. Peerce & Kevin Leitão

Regulators and law enforcement are taking proactive steps to further leverage anti–money-laundering monitoring and reporting tools in their battle with cyber attacks and cyber crimes. In-house legal and compliance teams need to be fully versed in the latest FinCEN and bank regulatory guidance on cyber-related crimes and have the right professionals available to assist them with these matters.

Features

Using Computer Forensics to Investigate Employee Data Theft Image

Using Computer Forensics to Investigate Employee Data Theft

Timothy M. Opsitnick, Joseph M. Anguilano & Trevor B. Tucker

When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft-of-IP analysis in order to preserve electronic data and uncover important evidence.

Features

State of the Industry: e-Discovery and Cybersecurity Image

State of the Industry: e-Discovery and Cybersecurity

Jared Coseglia

<b><i>Part One of a Three-Part Article</b></i><p>There are stark differences between e-discovery and cybersecurity, most notably that cybersecurity, as an avenue of career opportunity and responsibility, is much, much bigger. An examination of the current state of both industries coupled with a deep dive into the history of e-discovery will offer a prophetic look at the likely hiring patterns, job availability, compensation trends, and industry maturation of the cybersecurity vertical over the next decade.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES