Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

SCOTUS Takes Up Microsoft Case on Email Privacy Image

SCOTUS Takes Up Microsoft Case on Email Privacy

Tony Mauro

A long-running dispute between Microsoft and the Justice Department over providing the government with certain customer emails in criminal investigations will be refereed by the U.S. Supreme Court.

Features

New-Wave Legal Challenges for Bitcoin and Other Cryptocurrencies Image

New-Wave Legal Challenges for Bitcoin and Other Cryptocurrencies

Robert J. Anello & Christina Lee

As the adoption of cryptocurrencies — or digital currencies that are encrypted for security — spreads throughout the business and financial sectors, so too do the concerns that lack of regulation render the new-age currency susceptible to fraud, manipulation, and to being used as a vehicle for money laundering. Nevertheless, recent efforts by U.S. enforcement agencies to apply and enforce financial regulations indicate that cryptocurrency-based transactions will be under greater scrutiny than ever before.

Features

EU Push to Filter 'Illegal' Content Raises Alarms in Silicon Valley Image

EU Push to Filter 'Illegal' Content Raises Alarms in Silicon Valley

Ben Hancock

The European Commission (EU) is ramping up pressure on tech companies to more aggressively use automated filtering to scrub "illegal" content from the Internet, a move that is drawing criticism from some lawyers and free speech activists in Silicon Valley.

Features

Bitcoin Is Fueling the Ransomware Epidemic Image

Bitcoin Is Fueling the Ransomware Epidemic

M. Scott Koller

Money is a powerful motivator, but it alone wasn't enough to fuel the ransomware epidemic. After all, the first documented ransomware infection was in 1989, but it remained relatively unknown until its resurgence over the past five years. So what changed? In short, bitcoin.

Features

The Myth of the Secure Cloud Image

The Myth of the Secure Cloud

Nina Cunningham

"There's really no such thing as the cloud, there are only other people's computers." This may have been true at first; but it is now worth some investigation if the present threat environment today demands a secure cloud.

Features

Procedures for Protecting Entertainment Domain Names Against Cybersquatters Image

Procedures for Protecting Entertainment Domain Names Against Cybersquatters

Karen Levin, Ariel Ronneburger & Damias Wilson

Because there are so many new digital channels for possible intellectual property infringement, knowledge of the various mechanisms available to combat the issue is vital to enabling entertainment industry owners to protect their brand.

Features

The Equifax Breach: Why This One Is Different Image

The Equifax Breach: Why This One Is Different

F. Paul Greene

This is not the first time that a credit reporting agency has been breached, nor is it the first time that Equifax has reported a breach. What <i>is</i> different with the current breach is its size and the nature of information compromised, as well as the implications of the breach in light of the increasingly complex web of cybersecurity regulations nationwide.

Features

Big Data, Web 'Scraping' and Competition Law Image

Big Data, Web 'Scraping' and Competition Law

Shepard Goldfein & James Keyte

<b><i>The Debate Continues</i></b><p>Web "scraping" is one method of accumulating data that has sparked recent legal debate, both antitrust and otherwise. Legal challenges to Web scraping have involved privacy claims and claims under the federal Computer Fraud and Abuse Act, in addition to antitrust claims about the need to collect public data to be able to compete freely.

Features

There May Be 'No Do-Overs,' but SEC Hack Provides Important Security Lessons Image

There May Be 'No Do-Overs,' but SEC Hack Provides Important Security Lessons

Ed Silverstein

Even the Securities and Exchange Commission (SEC) can get hacked — and the recently announced cyber attack against the SEC is providing an important wake-up call for U.S. companies regulated by the powerful agency and the attorneys they work with.

Features

Website Accessibility: The Law and Your Business Priorities Image

Website Accessibility: The Law and Your Business Priorities

Matthias L. Niska

The first step to solving a problem is knowing it exists. But many businesses have never thought to ask whether their customer-facing websites are accessible to people with disabilities, and only become aware of the issue when they are sent a demand letter or served with a lawsuit alleging that their site violates the Americans with Disabilities Act (ADA).

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES