Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Social Media: Questions of Admissibility and Ethics Image

Social Media: Questions of Admissibility and Ethics

Khizar A. Sheikh, Lynne Strober & Jennifer Presti

<b><i>Part One of a Two-Part Article</i></b><p>This two-part article is divided into three sections: 1) Social media, defined; 2) Examples of how social media has been used in family law cases; and 3) Ethical considerations for attorneys who gather social media evidence.

Features

The Privacy Shield Scheme: Should Your Company Join? Image

The Privacy Shield Scheme: Should Your Company Join?

Jonathan Armstrong & André Bywater

The purpose of this article is to shed some light on the EU-US Privacy Shield for business. This is vital in order to enable businesses to make an informed decision on whether or not to join this scheme.

Features

New Sources of Discoverable Evidence Image

New Sources of Discoverable Evidence

Michael Ciaramitaro

<b><i>Part Two of a Two-Part Article</i></b><p>Last month, the author discussed some of the technologies people are using today, such as fitness trackers and intelligent personal assistants, and the e-discovery implications they entail. Like these, automotive "Black Boxes" and drones could yield important information for those seeking evidence in a legal action.

Features

Data Security and Data Breach Response Continue to Be a Hot Issue Image

Data Security and Data Breach Response Continue to Be a Hot Issue

Kevin Coy

<b><i>Lessons from 2017 Enforcement Actions and Guidance</b></i><p>Regulators including the FTC, the Department of Health and Human Services Office of Civil Rights (OCR) — the agency responsible for enforcing the HIPAA rules for protected health information (PHI) — and state attorneys general have issued guidance and announced a number of settlements in data security cases that are instructive about measures that organizations can take to reduce the potential for a data breach or, if a breach does occur, provide appropriate notice.

Features

Security First Approach Provides a Significant Advantage to Law Firms Image

Security First Approach Provides a Significant Advantage to Law Firms

Mark Sangster

The security industry all too often sells the next shiny object touted as the Holy Grail of security that protects against all cyber threats. And the following year, the next best thing hits the market and becomes the grail until proven fallible.

Features

Equifax Breach Will Fuel Identity Theft Remediation Debate Image

Equifax Breach Will Fuel Identity Theft Remediation Debate

Angela R. Matney

In the wake of suits filed against Equifax by consumers, businesses and governmental units, courts will have to grapple with the question of what remedies are appropriate. These issues are not unique to the Equifax incident, but the scope of the breach will undoubtedly lead to more debate than ever before.

Features

The Myth of the Secure Cloud Image

The Myth of the Secure Cloud

Nina Cunningham

“There's really no such thing as the cloud, there are only other people's computers.” This may have been true at first; but it is now worth some investigation if the present threat environment today demands a secure cloud.

Features

The Myth of the Secure Cloud Image

The Myth of the Secure Cloud

Nina Cunningham

"There's really no such thing as the cloud, there are only other people's computers." This may have been true at first; but it is now worth some investigation if the present threat environment today demands a secure cloud.

Features

The Equifax Breach: Why This One Is Different Image

The Equifax Breach: Why This One Is Different

F. Paul Greene

This is not the first time that a credit reporting agency has been breached, nor is it the first time that Equifax has reported a breach. What <i>is</i> different with the current breach is its size and the nature of information compromised, as well as the implications of the breach in light of the increasingly complex web of cybersecurity regulations nationwide.

Features

5 Things to Know About the First Wave of Equifax Actions Image

5 Things to Know About the First Wave of Equifax Actions

Amanda Bronstad

With 143 million people potentially hit by Equifax Inc.'s data breach, there's no doubt there will lawsuits — a lot of them."You'll have suits in…

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Bankruptcy Sales: Finding a Diamond In the Rough
    There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
    Read More ›