Features
Clients Drive Information Governance: Payment Tied to Guideline Compliance
To comply with the data side of the Outside Counsel Guidelines, firms must have a clear information governance strategy for which the firm's use of technology systems is foundational.
Features
EU E-Commerce Proposal Aims to Eliminate Barriers; Calls for E-Signatures and Net Neutrality
The European Union has put forth an ambitious proposal for how countries can eliminate barriers to e-commerce and protect businesses and consumers engaged in online transactions. But parts of the proposal, published as part of a World Trade Organization initiative that includes the U.S. and China, are likely to face opposition.
Features
Companies Poised To Repeat Data Privacy Compliance Mistakes
<b><i>New Study Shows U.S. Companies Are Taking the Same Failed Approach To Complying With California's Privacy Regulation As They Did for GDPR</b></i><p>U.S. companies haven't learned much from the missteps they made while preparing for the European Union's General Data Protection Regulation (GDPR), suggests a new study on data privacy regulation compliance.
Features
State Report: New NJ Data Breach Notification Legislation Signed
Legislation expanding the types of personal data that will trigger a required notification to customers in case of a breach, including email addresses and passwords, was signed into law by Gov. Phil Murphy.
Features
The Nice-to-Haves and Need-to-Haves of Cloud Computing
This article discusses what to look for in a cloud service provider and other issues that will help determine if moving to the cloud is the right move for your firm.
Features
The Eyes (and Privacy Laws) of Texas Are Upon You
<b><i>Consistent With the Cliché That “Everything's Bigger In Texas,” the Texas Legislature Has Introduced Not One, But Two Separate Bills Relating to the Privacy of Personal Information</b></i><p>The TPPA is arguably the less onerous of the two bills, although you might not necessarily realize it at first blush, given the broad way it defines “personal identifying information” (PII).
Features
Safeguarding Client Data: An Attorney's Duty to Provide 'Reasonable' Security
Effective cybersecurity requires an ongoing, risk-based, comprehensive process that addresses people, policies and procedures, and technology, including training. Effective security also requires an understanding that security is everyone's responsibility and constant security awareness by all users of technology.
Features
Getting Ready for Wide-Ranging Reach of California's Data Privacy Law
The CCPA is the first of its kind, generally applicable data protection law in the United States. What makes the CCPA unique is not only its applicability to companies like those in the entertainment and media industries, but also the rights it provides to consumers regarding their personal information (PI).
Features
The Principles of Good Cyber Risk Management
Apart from headline grabbing attacks, we are now seeing an epidemic of cyber attacks. Concern has shifted from dealing with data being stolen and sold on the dark Web to handling serious ransomware and destructive attacks, where attackers are looking for immediate monetary output.
Features
Second Circuit Blocks Video Privacy Suit Brought Against Barnes & Noble
A would-be class action against Barnes & Noble could have cost the bookseller hundreds of millions of dollars — not to mention a reputational hit for allegedly sharing private information about its customers' online video purchases with Facebook.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Delaware Chancery Court Takes Fresh Look At Zone of InsolvencyOver a decade ago, a Delaware Chancery Court's footnote in <i>Credit Lyonnais Bank Nederland, N.V. v. Pathe Communications</i>, 1991 WL 277613 (Del. Ch. 1991), established the "zone of insolvency" as something to be feared by directors and officers and served as a catalyst for countless creditor lawsuits. Claims by creditors committee and trustees against directors and officers for breach of fiduciary duties owed to creditors have since become commonplace. But in a decision that may have equally great repercussion both in the Boardroom and in bankruptcy cases, the Delaware Chancery Court has revisited zone-of-insolvency case law and limited this ever-expanding legal theory.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The Right to Associate in the DefenseThe "right to associate" permits the insurer to work with the insured to investigate, defend, or settle a claim. Such partnerships protect the insurer and can prove beneficial to the insured's underlying case and ultimate exposure.Read More ›
- Ransomware – COVID-19 & Upgrading Your DefensesIt's pretty shameful that in the current crisis we're seeing ransomware on the rise. It's even more shameful that organizations involved in fighting the virus seem to be especially at risk.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
