Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

New York's Latest Cybersecurity Commitment Image

New York's Latest Cybersecurity Commitment

Erik B. Weinick

On Aug. 9, 2023, Gov. Kathy Hochul introduced New York's inaugural comprehensive cybersecurity strategy. In sum, the plan aims to update government networks, bolster county-level digital defenses, and regulate critical infrastructure.

Features

The EU-U.S. Data Privacy Framework: Did Transferring Personal Data from the EU to the U.S. Just Get Easier? Image

The EU-U.S. Data Privacy Framework: Did Transferring Personal Data from the EU to the U.S. Just Get Easier?

Wim Nauwelaerts

Businesses and organizations that (regularly) transfer personal data from the EU to the U.S. should carefully assess, on a case-by-case basis, whether it makes sense to rely on the new EU-U.S. Data Privacy Framework or to use one of the other data transfer tools that are available under the GDPR.

Features

10 Steps Legal Departments Should Be Taking to Prepare for the SEC's Newly Adopted Cybersecurity Risk Governance Rule for Public Companies Image

10 Steps Legal Departments Should Be Taking to Prepare for the SEC's Newly Adopted Cybersecurity Risk Governance Rule for Public Companies

Megan Silverman

By readying your company's cybersecurity program now to comply with the SEC's cyber rules, you will also arm your company with a better defense against cyberthreat actors, reduce the reputational harm that comes along with a cybersecurity incident and increase investor confidence in the company's cybersecurity program.

Features

Top Signs Your Firm Is In Need of Legal Analytics Image

Top Signs Your Firm Is In Need of Legal Analytics

Aria Nejad

As technology continues to advance, integrating legal analytics into the practice becomes not just a choice but a necessity for staying competitive and providing top-notch legal services in the modern legal landscape.

Features

DOJ Calls On Companies to Incorporate Data Analytics In Anti-Corruption Compliance Programs Image

DOJ Calls On Companies to Incorporate Data Analytics In Anti-Corruption Compliance Programs

Fotis Konstantinidis, Michael Pace & Jason Wright

This article explains the DOJ's recent emphasis on robust data analytics in anti-corruption compliance programs, outlines how data analytics can and should be used in these programs, and suggests an approach to help legal counsel and companies determine if corporate programs will pass muster with the DOJ.

Features

AI and Law Practice: A Roadmap for Success In Modern Legal Firms Image

AI and Law Practice: A Roadmap for Success In Modern Legal Firms

Melissa "Rogo" Rogozinski & Steve Salkin

This article lays out a general roadmap for success in modern legal firms through the strategic incorporation of AI technologies.

Features

Cryptocurrency Risk Is Not So Hidden Image

Cryptocurrency Risk Is Not So Hidden

J. Eric Wise

Cryptocurrency exchanges and law together are an evolving space. As regulation of cryptocurrency advances, and case law and practice develops, more certainty around who holds what in a cryptocurrency exchange failure will develop. In the meantime, knowing the risks, and mitigating the risks where possible, is the prudent course of action for the cryptocurrency investor and trader.

Features

Canada Leads In Crypto Regulations Image

Canada Leads In Crypto Regulations

Gail J. Cohen

FTX's collapse pushed Canada's already robust cryptocurrency regulations further, offering protection to consumers and stability for compliant platforms but resulting in some major global platforms quitting the country because they weren't willing to comply.

Features

National Cybersecurity Strategy: Potential Impacts to Consider Image

National Cybersecurity Strategy: Potential Impacts to Consider

Daron Hartvigsen

What are the impacts to civil society and government if the plan works? We should consider that "collecting intelligence, imposing economic costs, enforcing the law, and, conducting disruptive actions" will work by some measure, and if so, the impacts to the cybersecurity ecosystem could be profound.

Features

How Law Firms Can Avoid A Summer of Cyberattack Threats Image

How Law Firms Can Avoid A Summer of Cyberattack Threats

Scott Kramer

Summer at law firms creates an attack surface of which hackers love to take advantage. Legal and support staff rotate through vacations and time off, new crops of interns unfamiliar with tech processes enter the fold, and the remaining employees are often burned out and too distracted to notice the critical signs of an impending cyberattack.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Landlord's Lien under the Uniform Commercial Code
    While used less frequently than security deposits and personal guarantees, granting the landlord a security interest in its personal property can enhance a tenant's credit. This device may be more effective when conferred by certain types of tenants than by others, but nevertheless, it may provide the landlord with a potent default remedy, particularly in a fragile market.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Legal Possession: What Does It Mean?
    Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
    Read More ›