Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

EU Push to Filter 'Illegal' Content Raises Alarms in Silicon Valley Image

EU Push to Filter 'Illegal' Content Raises Alarms in Silicon Valley

Ben Hancock

The European Commission (EU) is ramping up pressure on tech companies to more aggressively use automated filtering to scrub "illegal" content from the Internet, a move that is drawing criticism from some lawyers and free speech activists in Silicon Valley.

Features

Bitcoin Is Fueling the Ransomware Epidemic Image

Bitcoin Is Fueling the Ransomware Epidemic

M. Scott Koller

Money is a powerful motivator, but it alone wasn't enough to fuel the ransomware epidemic. After all, the first documented ransomware infection was in 1989, but it remained relatively unknown until its resurgence over the past five years. So what changed? In short, bitcoin.

Features

The Myth of the Secure Cloud Image

The Myth of the Secure Cloud

Nina Cunningham

"There's really no such thing as the cloud, there are only other people's computers." This may have been true at first; but it is now worth some investigation if the present threat environment today demands a secure cloud.

Features

Procedures for Protecting Entertainment Domain Names Against Cybersquatters Image

Procedures for Protecting Entertainment Domain Names Against Cybersquatters

Karen Levin, Ariel Ronneburger & Damias Wilson

Because there are so many new digital channels for possible intellectual property infringement, knowledge of the various mechanisms available to combat the issue is vital to enabling entertainment industry owners to protect their brand.

Features

The Equifax Breach: Why This One Is Different Image

The Equifax Breach: Why This One Is Different

F. Paul Greene

This is not the first time that a credit reporting agency has been breached, nor is it the first time that Equifax has reported a breach. What <i>is</i> different with the current breach is its size and the nature of information compromised, as well as the implications of the breach in light of the increasingly complex web of cybersecurity regulations nationwide.

Features

Big Data, Web 'Scraping' and Competition Law Image

Big Data, Web 'Scraping' and Competition Law

Shepard Goldfein & James Keyte

<b><i>The Debate Continues</i></b><p>Web "scraping" is one method of accumulating data that has sparked recent legal debate, both antitrust and otherwise. Legal challenges to Web scraping have involved privacy claims and claims under the federal Computer Fraud and Abuse Act, in addition to antitrust claims about the need to collect public data to be able to compete freely.

Features

There May Be 'No Do-Overs,' but SEC Hack Provides Important Security Lessons Image

There May Be 'No Do-Overs,' but SEC Hack Provides Important Security Lessons

Ed Silverstein

Even the Securities and Exchange Commission (SEC) can get hacked — and the recently announced cyber attack against the SEC is providing an important wake-up call for U.S. companies regulated by the powerful agency and the attorneys they work with.

Features

Website Accessibility: The Law and Your Business Priorities Image

Website Accessibility: The Law and Your Business Priorities

Matthias L. Niska

The first step to solving a problem is knowing it exists. But many businesses have never thought to ask whether their customer-facing websites are accessible to people with disabilities, and only become aware of the issue when they are sent a demand letter or served with a lawsuit alleging that their site violates the Americans with Disabilities Act (ADA).

Features

Trade Secrets Litigation: The No-Longer-Forgotten Part of the Tech IP Arsenal Image

Trade Secrets Litigation: The No-Longer-Forgotten Part of the Tech IP Arsenal

Zach Warren

<b><i>With Massive Jury Rewards and the DTSA Encouraging Federal Litigation, Trade Secrets Litigation Is Seeing a Surge in the Tech Industry</b></i><p>These days, many of the big IP litigation battles involving companies like Facebook, Uber, and Epic, have nothing to do with patents, trademarks or copyrights at all. Instead, it's all about the perhaps forgotten part of IP: trade secrets.

Features

What's the Deal with WhatsApp? Image

What's the Deal with WhatsApp?

Julian Sheppard & Michele C.S. Lange

<b><i>Investigating and Discovering Mobile Device Data</b></i><p>Analyzing data from mobile devices is still uncharted territory for many in Legal and IT. Accordingly, today's modern legal and technology professionals need to brush-up on all things mobile. This includes understanding where applicable data resides in a mobile device and what common challenges are associated with accessing, preserving and extracting this data. One such app taking the mobile device world by storm is WhatsApp.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES