Features
Untangling the Mystery of Cybersecurity Insurance
IT security professionals used to warn that only two types of businesses exist: those that have been hacked, and those that will be. Now, many are even more pessimistic, and divide the world's businesses into companies that know that they have been hacked, and those that don't. Law firms are juicy targets with all the personal identifiable information (PII) contained in client files. Intellectual property practices are especially attractive to cyber thieves because of the value of patent, trademark and trade secret information.
Features
A Primer for the Entertainment Industry on the Use of Blockchain Technology
This article familiarizes lawyers with cryptocurrency and, particularly, the enabling blockchain technology, methodologies and systems.
Features
<i><b>BREAKING NEWS:</b></i><br> Sedona Conference Releases 3rd Edition of e-Discovery Principles for Public Comment
The Updates are the First Released Since 2007
Features
Cybersecurity: Law Firms Are Coming Up Short
An ALM Survey Reports Disturbing Information
Features
What You Need to Know to Get Started with Privacy Shield Certification
If your company maintains operations in the European Union or is U.S. based but obtaining personal data from European citizens, you will need to strongly consider obtaining certification under the new Privacy Shield framework. Certification began in August 2016, and will make compliance with EU privacy laws when transferring data to the U.S. possible for the immediate future.
Features
Blockchain: A Short Primer for Lawyers
This article familiarizes lawyers with cryptocurrency and, particularly, the enabling blockchain technology, methodologies and systems. It also introduces lawyers to blockchain's current and future uses and points to other resources to learn more about this profoundly disruptive and promising collection of technological advancements.
Features
New York State's Financial Services Cybersecurity Regulation
The Regulation was designed to promote the protection of customer information as well as the underlying information technology systems of regulated entities in light of the ever-increasing threat of cyber attacks.
Features
Is Your Law Firm Running 'Encryption Light?'
With so many warnings to lawyers about transmitting unsecured email and attachments, it can be difficult to understand the solutions available and how they differ. Some may improve security but make communications cumbersome. If too cumbersome, users seek a way to work around them or choose less powerful tools.
Features
Cyber Spies: In-House Legal Fights Back Against Cyberespionage
<b><i>An Exploration of the Modern Cyberespionage Threat and How In-House Legal Departments Are Fighting Back</b></i><p>Though faced with limited legal remedies, counsel are coming up with creative new ways to go after cyberespionage actors, and partnering with an array of cyber professionals and government agencies to combat the threat.
Features
The 'Soft Underbelly' of Cybersecurity Meets Legal Ethics
Legal departments for business organizations rate cybersecurity, regulation and ethics compliance among their chief concerns, and they are well aware of surveys showing law firms to be the "soft underbelly" of business security due to weakness of their cybersecurity.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- The Binding Effect of Plea Agreements In White Collar CrimesFederal plea agreements sometimes state explicitly that they are limited to that one office and do not bind other U.S. attorney's offices. In this article, we discuss the circuit courts' competing approaches to interpreting the binding effect of plea agreements and the Department of Justice policy.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›
- Issues in Reverse Morals Clauses In Talent Influencer Contracts With Product BrandsThe next company general counsel to slide a morality clause across the desk for a celebrity or web influencer to sign shouldn't be surprised if that talent also whips out a morals clause, one to cancel the contract if the company's brand acts immorally.Read More ›