Features

<i>Online Extra</i>: Equifax's Liabilities Pile on After Discovery of New Compromised Data
After discovering that 2.4 million of its customers had partial driver's license information stolen, Equifax will likely face renewed questions over the handling of its post-breach internal investigation.
Features

China's Cybersecurity Law Isn't Just About Cybersecurity
The law — which includes data localization mandates, cybersecurity best practices, and data transfer restrictions — has similarities to other cyber laws such as the EU's General Data Protection Regulation (GDPR). But in this case, it's also being used to police internet content and behavior.
Features

The Uber Breach and the Need for an Independent Privacy Function
Uber has incurred significant legal and reputational exposure as a result of the way that the company handled the breach. In the coming months, there will be a great deal of information and regulatory and judicial action that will act as guidance, or more precisely, a checklist of what-not-to-do, for companies that suffer a data breach.
Features

How Blockchain Technology Can Drive the Legal Industry Forward
A new legal structure that bestows and monitors trust must be employed. Is decentralization of traditional, gigantic central bank repositories of data the answer? Is blockchain technology the new path that the legal industry should take to sustain in the digital age? Let us consider the most significant implications of decentralized technologies to the legal industry.
Features

Regulators are Catching Up to Cryptocurrency and Blockchain Technology within the Financial Services Industry
<b><i>Part Two of a Two-Part Article</b></i><p>The proliferation of cryptocurrency and blockchain is being driven by the efficiencies and protections afforded to early adopters. The operational efficiencies and resulting cost savings are readily apparent in the financial services industry and are equally coveted by the entities trying to implement them and by the customers who will benefit from the implementation. However, neither party can fully enjoy these benefits without first understanding and overcoming the various regulatory hurdles.
Features

Top Cybersecurity Takeaways from Relativity Fest 2017
Cybersecurity is a hydra of complexity. Keeping a grasp on it requires constant re-education. What no one tells you: managing your company's cyber vulnerability demands a willingness for personal vulnerability. Being honest about our cyber risks is painful. And scary.
Features

Influencing the Influencers
The importance of promoting brands and products on digital platforms has continued to grow as advertisers are learning how to use social media to reach out to specific populations by harnessing the power and goodwill of the people on these platforms that are popular with and influence particular niche groups of interest. These so-called “influencers” can have thousands, or even millions and tens of millions of followers. But when is the influencer an objective critic, and when is she a paid spokesperson?
Features

Artificially Intelligent Blockchain of Things: Examining Legal Tech's Biggest Buzzwords
<b><i>Panelists at ALM Cybersecure 2017 Delved Into the Year's Biggest Legal Technology Buzzwords and the Hype Fueling Their Popularity</i></b><p>Legal technology has no shortage of buzzwords. The latest slew to take the industry by storm were the topic conversation in a Dec. 5 panel at ALM's CyberSecure event in New York.
Features

The Impact of the Surge of Biometric Data Privacy Lawsuits Against Employers
The growing acceptance of biometric data as a form of identification for employees means that many employers will likely have to face issues covered in state legislation in the immediate future.
Features

Sixth Circuit Issues Ruling of First Impression on Unmasking of 'John Doe' Defendants in Copyright Infringement Litigations
Since the start of the digital media era, content industries have engaged in a tug-of-war with courts over whether the identity of defendants accused of violating plaintiffs' rights, via online distribution, can be revealed.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Benefits of Blockchain for e-Discovery and Data PreservationAs businesses across various industries increasingly adopt blockchain, it will become a critical source of discoverable electronically stored information. The potential benefits of blockchain for e-discovery and data preservation are substantial, making it an area of growing interest and importance.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›