Features

Prepping a Mock Notification Letter Before a Cybersecurity Breach Hits
Being prepared for the worst before it even happens can minimize the damage in the event of a cybersecurity incident. To get any company ready for a cybersecurity event, the first step is to organize a team to write a mock breach notification letter that will represent your message to the world about your failure in the event you have a breach.
Features

Legal Tech: Moving to the Cloud for Business Continuity Planning
In the past year, the devastation caused by natural disasters has been immense. Law firms, like every other business, are left to deal with the aftermath of these catastrophic events. Firms that have established business continuity plans to put into effect when these instances occur will find themselves a step ahead in the disaster recovery process. And the ones leveraging cloud technology are at an even greater advantage.
Features

Sticking a Hand in the Internet Cookie Jar
Why Collecting Children's Online Data is a Risk As convenient, useful and cool mobile technology and interconnected devices are, they come with risks that remain largely unseen or, worse, ignored. For manufacturers, they also pose regulatory litigation, and insurance risks, especially when children end up using their "smart" products.
Features

Are You Prepared? Dealing with GDPR-like Rules Spreading Across the Nation
California's Consumer Privacy Act, signed into law earlier this year, follows a growing line of consumer privacy laws, such as the European General Data Protection Regulations (GDPR), Canadian Breach of Security Safeguards Regulations of the Personal Information Protection and Electronic Documents Act (PIPEDA), and related New York Department of Financial Services Cybersecurity Rules and Regulations (NYCRR 500).
Features

Right Out of the Box: California Enacts First-of-its-Kind Statute Regulating Internet-of-Things
<b><i>Companies Impacted By California's SB-327 — Especially Manufacturers and Distributors of IoT Devices — Should Work to Ensure Compliance With the Act As Soon As Possible If Regulatory Fallout Is to Be Avoided Come January 2020</b></i><p>While a great deal of attention has focused on the California Consumer Privacy Act, California also passed a less-publicized, but highly critical, statute that will regulate certain aspects of Internet of Things device security.
Features

How Legal Teams Can Leverage AI
Artificial intelligence and automation are creeping into the workplace of every industry, bringing the added benefits of efficiency and security. As more organizations implement AI solutions across their departments, businesses still relying on outdated, manual processes will fall behind.
Features

The Blockchain Can Finally Secure Supply Chains Against Cyberattacks
Cyber criminals looking for new ways to exploit company networks are turning their focus to the privileged network access given to the many players involved in supply chains. As supply ecosystems grow, and points of vulnerability proliferate, businesses will have to turn to distributed ledger technology.
Features

Worried About Complying with ABA Opinion 483 on Cybersecurity? Fear No More
In response to the omnipresent threat of cyberattacks, the ABA issued Formal Opinion 483, which addresses the obligations imposed upon lawyers to safeguard their clients' data. Here's how to achieve compliance.
Features

Legal Tech: Cloud and Security Considerations for e-Discovery
E-discovery presents some special considerations that need to be examined before deciding what is best for your organization and really taking a stand in the on-premises vs. cloud debate.
Features

Legal Tech: Cases Highlighting Judicial Discretion in Ordering E-Discovery Sanctions
Three cases from the summer of 2018 reinforce some of the key themes of recent e-discovery case law
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- The Unlicensed Real Estate Broker in New York: BewareThe U.S. District Court for the Northern District of New York recently determined that because New York prohibits unlicensed real estate brokers from pursuing payment in its courts for services rendered, a plaintiff who performed real estate work for a client who then did not pay had no standing to sue.Read More ›
- Players On the MoveA look at moves among attorneys, law firms, companies and other players in entertainment law.Read More ›