Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

The California Consumer Privacy Act: Everything You Wanted to Know But Were Afraid to Ask — 100 Days Out Image

The California Consumer Privacy Act: Everything You Wanted to Know But Were Afraid to Ask — 100 Days Out

Alan L. Friel

Part One of a Two-Part Article Responses to questions businesses frequently ask about the impacts of the CCPA. Implementation challenges inevitably will arise as a company works to apply these new requirements to its business practices. The time is now to start preparing for the CCPA, as well as for other new U.S. privacy laws that are likely to follow.

Features

Data Privacy Reviews: The Cornerstone of a Data Breach Response Image

Data Privacy Reviews: The Cornerstone of a Data Breach Response

Andrew Goodman

Including a managed document review vendor in your incident response plan is critical.

Features

Marriott Moves to Dismiss Data Breach Lawsuit, Says Passport Numbers Useless to Hackers Image

Marriott Moves to Dismiss Data Breach Lawsuit, Says Passport Numbers Useless to Hackers

Amanda Bronstad

In Its Motion To Dismiss, Marriott Insisted the Breach Caused No Harm to Its Guests and Attached a Declaration By a Former Government Official Who Wrote: "A U.S. Passport Is Virtually Impossible to Forge Successfully." Marriott is insisting that last year's cyberattack did no harm to its hotel guests, not least of which because hackers cannot use stolen passport numbers.

Features

Legislative Heat Wave: A Mid-Year Review of Upcoming Cybersecurity Laws and Enforcement Activity Image

Legislative Heat Wave: A Mid-Year Review of Upcoming Cybersecurity Laws and Enforcement Activity

Michael Bahar, Sarah Paul, Mary Jane Wilson-Bilik & Ali Jessani

While legislation to enhance data privacy rights and obligations continue to make headlines, regulators and legislators are also stepping up their cybersecurity expectations. In the first half of 2019, a number of states have updated their existing data breach notification laws and passed new cybersecurity requirements.

Features

How to Keep Mobile Data Safe: The Case for On-Device AI Image

How to Keep Mobile Data Safe: The Case for On-Device AI

Gevorg Karapetyan

Bring Your Own Device is one of the biggest compliance-related issues companies face today, and when it comes to security risks, law firms are prime targets. Considering law firms are built on their reputation, firms must make every assurance that the technology they use will protect their data.

Features

SHIELD Act Signed in NY Image

SHIELD Act Signed in NY

F. Paul Greene

<b><i>Defines Data Breach and Requires Data Security Controls</b></i><p>New York has brought itself into line with a number of states concerning how they define a data breach, and, where applicable, what substantive security controls they require.

Features

EU Court Rules Adding Facebook 'Like' Button Triggers GDPR Data Collection Obligation Image

EU Court Rules Adding Facebook 'Like' Button Triggers GDPR Data Collection Obligation

Caroline Spiezio

Websites with embedded Facebook “like” buttons must inform users their data will be collected and processed by the social media giant, the Court of Justice of the European Union has ruled.

Features

Legal Tech: Smart Speakers and E-Discovery Image

Legal Tech: Smart Speakers and E-Discovery

Brian Schrader

For businesses that own such a device, or for individual employees who might have a personally owned one on their office desk, the question of who owns any recorded data remains murky.

Features

How Changes In Texas Anti-SLAPP Statute Affects Entertainment Industry Image

How Changes In Texas Anti-SLAPP Statute Affects Entertainment Industry

Brent Turman

Approximately 30 states have enacted anti-SLAPP statutes, which are intended to deter lawsuits that impede the right to free speech and other related activities. New statutory language in Texas's anti-SLAPP statute specifically protects those in the entertainment and media industries, and such explicit reference should prove comfort to content creators and publishers.

Features

The International Encryption Debate: Privacy Versus Big Brother Image

The International Encryption Debate: Privacy Versus Big Brother

Robert J. Anello & Richard F. Albert

Although increased reliance on technology such as emails and texts has provided greater opportunity to gather evidence of criminal activity, law enforcement agencies around the world complain that encryption technologies make it difficult to catch criminals and terrorists and therefore should be restricted.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›