Features
Data Breach by Insiders: Three Key Steps to Keep Your Company Out of the Headlines
For many of us, the term "data breach" conjures up images of a shadowy character in a dark hoodie — a nefarious criminal. But the more we understand about how data breach incidents originate and propagate, the more likely we are to shift focus from outsider hackers to insider threats.
Features
<i><b>Legal Tech:</i></b><br>Three Legal Challenges In-House Counsel Face with 3-D Printing
<b><i>As 3-D Printing Becomes More Widespread, In-House Counsel Will Be Tasked with Complex IP and Liability Challenges</b></i><p>Yet another potentially disruptive technology is set to join the ranks of blockchain and AI as a headache for legal: 3-D printing. While its use in legal is limited, 3-D printing presents unique challenges to in-house counsel prosecuting or defending IP and liability issues.
Features
Virtual Snooping
The modern-day snoop is all too often someone you know. If this consideration doesn't leave you paranoid and looking over your shoulder, it should.
Features
Presidential Cybersecurity Handoff
Given the pending change in administration and uncertainty around President-elect Trump's priorities on cybersecurity, an analysis of the current federal cyber landscape may yield insights into how the next administration might prioritize their approach on this important front.
Features
Internet Law in a Trump Presidency
President Trump is already being pressured to reverse President Obama's Open Internet Order (also known as “net neutrality”) and take an aggressive stance against it. It remains to be seen how President Trump will balance the call for privacy regulations amidst our country's vulnerability to cyber-attacks.
Features
Is Your Data Breach Response Plan Good Enough? Stress Test It
As the chances of a data breach incident increase, savvy businesses have invested time and thought in a response plan. But plans never survive first contact with the enemy. Stress test your incident response plan to find and resolve its weaknesses while time is on your side.
Features
Most Firms Feel Assured in Cybersecurity Abilities, But Is That False Confidence?
Law firms are increasingly confident in their cybersecurity capabilities, despite many falling short of adequate breach response preparation.
Features
Best Practices in Data Security for Financial Institutions
The Federal Financial Institutions Examination Council (FFIEC) recently revised its Information Security Booklet. The changes bring the financial services industry closer to the goal of having a clearly defined set of cybersecurity and data protection protocols to ensure regulatory compliance.
Features
Cybersecurity Comes Together In Legal and Finance
Data security in the financial and legal industries is a tale of two sectors. While the financial industry is heavily regulated and constantly watched by federal agencies, law has at times operated in an almost laissez-faire environment, more ruled by a culture of confidentiality and secrecy than hard regulatory rules.
Features
Data Breach Lawsuit Highlights the Need for Diligence when Purchasing Cyberinsurance
Well-known restaurant chain, P.F. Chang's China Bistro, recently sustained a significant hit to its cyberinsurance coverage. The federal court's opinion in the case serves as a lesson to policyholders regarding cyberinsurance in a rapidly evolving market. Due diligence is the name of the game when placing such insurance in order to understand the scope of coverage.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- The Binding Effect of Plea Agreements In White Collar CrimesFederal plea agreements sometimes state explicitly that they are limited to that one office and do not bind other U.S. attorney's offices. In this article, we discuss the circuit courts' competing approaches to interpreting the binding effect of plea agreements and the Department of Justice policy.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›
- Issues in Reverse Morals Clauses In Talent Influencer Contracts With Product BrandsThe next company general counsel to slide a morality clause across the desk for a celebrity or web influencer to sign shouldn't be surprised if that talent also whips out a morals clause, one to cancel the contract if the company's brand acts immorally.Read More ›