Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Looking to the FFIEC Revised Information Security Booklet for Best Practices in Data Security for Financial Institutions Image

Looking to the FFIEC Revised Information Security Booklet for Best Practices in Data Security for Financial Institutions

Craig Nazzaro

The Federal Financial Institutions Examination Council (FFIEC) recently revised its Information Security Booklet. The changes bring the financial services industry closer to the goal of having a clearly defined set of cybersecurity and data protection protocols to ensure regulatory compliance.

Features

Legal Tech: e-Discovery: Judge Says 'NO' to Party's Bid to Force Use of Predictive Coding Image

Legal Tech: e-Discovery: Judge Says 'NO' to Party's Bid to Force Use of Predictive Coding

By H. Christopher Boehning & Daniel J. Toal

Would Judge Peck's admiration and advocacy for predictive coding lead him, upon a request by the opposing party, to force a responding party to use it against that party's own wishes? Judge Peck recently faced this issue, putting potential use of predictive coding at odds with established precedent and procedure regarding how to conduct discovery.

Columns & Departments

Movers & Shakers Image

Movers & Shakers

ssalkin & Law Journal Newsletters

Movers & Shakers Law firm Venable recently announced the addition of former AOL Inc. chief counsel, Charles D. Curran, as a partner in…

Features

Introducing the Cybersecurity Reference Model Image

Introducing the Cybersecurity Reference Model

Jared Coseglia

When EDRM and CSRM Collide, Much Is Illuminated About the Hiring Trends in Both e-Discovery and Cybersecurity

Features

Sixth Circuit's Decision on Privacy Claims over Data Breaches Image

Sixth Circuit's Decision on Privacy Claims over Data Breaches

By Shari Claire Lewis

Data breaches such as the one Yahoo recently revealed (500 million accounts!) get the big headlines. In response, large companies double down on their efforts to protect the security of their data. But small to midsize businesses often fail to appreciate the risk of a data breach to their own business.

Features

2016: The Year Everything Changed In Social Media Marketing Image

2016: The Year Everything Changed In Social Media Marketing

By Larry Bodine

Three megatrends culminated in online business development in 2016, requiring attorneys to change their digital marketing tactics and to re-focus on what produces results.

Features

Increase of IP Cyberthefts on the Horizon, and Many Unprepared Image

Increase of IP Cyberthefts on the Horizon, and Many Unprepared

Ricci Dipshan

Though cybertheft of intellectual property is predicted to dramatically increase over the next 12 months, a significant portion of companies has yet to fully secure their IP assets, according to a survey released by Deloitte Cyber Risk Services.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Broker Lien Laws
    Today, 34 jurisdictions have some form of statute that specifies whether, how, and for what a broker may file a lien for the non-payment of a commission in connection with the sale or lease of commercial real estate. A few states simply give brokers the right to file liens under mechanics' lien statutes, but more than 30 have enacted broker-specific lien laws.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›