Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Practical Approaches to the EU-US Privacy Shield Image

Practical Approaches to the EU-US Privacy Shield

Dan Panitz & H. Bruce Gordon

This article discusses the corporate impact of the EU-US Privacy Shield and practical approaches to managing global corporate data in the wake of <i>Schrems</i>.

Features

In Light of Recent FTC Actions, Review Your Privacy Policy Image

In Light of Recent FTC Actions, Review Your Privacy Policy

Devika Kornbacher, Scott Breedlove, Janice Ta & Aislinn Affinito

The United States does not have comprehensive legislation addressing the privacy implications of the collection and use of geolocation data. However, the Federal Trade Commission (FTC) has used its enforcement authority under Section 5 of the FTC Act to regulate companies engaged in unfair or deceptive practices involving geolocation data.

Features

WhatsApp, Encryption and the Battle with Law Enforcement Image

WhatsApp, Encryption and the Battle with Law Enforcement

Domingo Montanaro

It is widely accepted that much of today's communications are digital — and as a result, the encryption of data, the privacy laws governing that data, and the role that governments play when national security and law enforcement issues are at stake is a very hot topic.

Features

The Human Factor In Information Security Image

The Human Factor In Information Security

Michael Kemps & Kimberly Pease

No one can deny that cyberattacks are the new norm. Such risks will increasingly challenge our ability to operate our businesses. In the world of cybercrime, everyone — from individuals to nation-states — is a target. However, some targets are more alluring than others.

Features

The Human Factor In Information Security Image

The Human Factor In Information Security

Michael Kemps & Kimberly Pease

No one can deny that cyberattacks are the new norm. Such risks will increasingly challenge our ability to operate our businesses. In the world of cybercrime, everyone — from individuals to nation-states — is a target. However, some targets are more alluring than others.

Features

Managing Risk in Light of 'Shadow IT' Image

Managing Risk in Light of 'Shadow IT'

David Ray

Information Governance in the Age of Cloud Application Proliferation

Features

Sixth Circuit's Decision on Privacy Claims over Data Breaches Image

Sixth Circuit's Decision on Privacy Claims over Data Breaches

By Shari Claire Lewis

Data breaches such as the one Yahoo recently revealed (500 million accounts!) get the big headlines. In response, large companies double down on their efforts to protect the security of their data. But small to midsize businesses often fail to appreciate the risk of a data breach to their own business.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES