Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

The Situation of Your Company's CISO and How It Impacts Data Security Image

The Situation of Your Company's CISO and How It Impacts Data Security

Kenya Parrish-Dixon

The intensity of information security briefings often leads to organizations tucking the CISO under the CIO instead. After all, all technology is related, right? This is a huge mistake, and it is wreaking havoc on American data security.

Features

The Unheralded Value of a Contract Image

The Unheralded Value of a Contract

Andrew Banquer

The most important part of a contract is the data that it generates. If you take all that data from each contract, then aggregate, organize and analyze it, you will have critical insights into the overall effectiveness of your contracting process and the way you transact business.

Features

Should Your Clients' Involvement With Cryptocurrency Scare You? Image

Should Your Clients' Involvement With Cryptocurrency Scare You?

Ross Benson & Robert N. Driscoll

It's not a matter of whether you have an interest in crypto, think it's all a bizarre techno-bubble, the eventual replacement for fiat currency, or somewhere in between. The fact of the matter is your clients, and future clients, are more likely than ever to have a connection to this market, and a brief review of the headlines can make this prospect seem terrifying.

Features

The World of NFTs Image

The World of NFTs

Christine K. Au-Yeung

NFTs have been all the rage lately. So what exactly are they?

Features

Can You Hear Me Now? — Privacy of Discussions Image

Can You Hear Me Now? — Privacy of Discussions

Leonard Deutchman 

This article looks at privacy discussions, focusing on what in the circumstances discussed renders the IT data private and whether the criteria relied upon when courts and others in the discussion determine that the data is or is not private is truly determinative, as well as properly understood.

Features

How to Avoid 'Privacy Debt' Image

How to Avoid 'Privacy Debt'

Catherine Zhu

For many tech companies today, their products and business model require the collection and storage of data. At the same time, a failure to build adequate data protection technology, processes, and operations will continuously generate "privacy debt" for the business. The accumulation of this "privacy debt" can eventually turn away customers, attract regulatory penalties, and create an existential risk for the company.

Features

Legal Tech: Time to Move from Email to Centralized Platform for E-Discovery Image

Legal Tech: Time to Move from Email to Centralized Platform for E-Discovery

Wendy Leibowitz

Lawyers need to move away from email as a project management tool to a centralized project management platform — akin to a huge, shared, digital whiteboard — where all production requests are entered on a form that meets litigation support needs.

Features

The Adoption of Legal Analytics Image

The Adoption of Legal Analytics

Karl Harris

The legal profession continues to embrace legal analytics and its advantages in increasing numbers every year. Now, the more interesting questions pertain to how legal professionals use legal analytics and what the likely path is for legal analytics in the future.

Features

Maintaining Attorney-Client Privilege and Work Product Protections over Forensic Reports in Light of 'Wengui v. Clark Hill' Image

Maintaining Attorney-Client Privilege and Work Product Protections over Forensic Reports in Light of 'Wengui v. Clark Hill'

Kim Peretti, Jon Knight, & Emily Poole

The Clark Hill opinion is notable because not only does it follow a string of recent opinions that have found data breach forensic reports not to be entitled to work product protection, it also goes one step further to find that a data breach forensic report is not protected by attorney-client privilege.

Features

Why Untangling the CISO from IT Can Improve Governance and Security Outcomes Image

Why Untangling the CISO from IT Can Improve Governance and Security Outcomes

Jake Frazier

Despite the fact that the CISO's duties are growing in scope and importance, and data protection has become a board-level concern, many security leaders still do not have a direct line to the CEO.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Unlicensed Real Estate Broker in New York: Beware
    The U.S. District Court for the Northern District of New York recently determined that because New York prohibits unlicensed real estate brokers from pursuing payment in its courts for services rendered, a plaintiff who performed real estate work for a client who then did not pay had no standing to sue.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • How the U.S.-China Trade War Effects IP Strategy
    The trade war between the United States and China has had far-reaching effects on international trade and the global economy. The dispute is slowly developing into a battle of attrition, without any immediate resolution on the horizon despite ongoing trade talks. As businesses change the way they operate in response to this unpredictable trade environment, counsel should consider the risks and potential impacts on corporate IP strategy.
    Read More ›