Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Senate Votes to Repeal FCC Internet Privacy Rules Image

Senate Votes to Repeal FCC Internet Privacy Rules

Lora Hollien

The FCC's move to stop Internet service providers from collecting customers' personal information without consent has itself been halted. The Senate voted 50-48 on March 24 to overturn the rules, with the House expected to follow suit.

Features

In Light of Recent FTC Actions, Review Your Privacy Policy Image

In Light of Recent FTC Actions, Review Your Privacy Policy

Devika Kornbacher, Scott Breedlove, Janice Ta & Aislinn Affinito

Every day, billions of mobile and Internet-enabled computers, smartphones, watches, drones and even coffee machines are collecting vast amounts of geolocation…

Features

Back in the GDPR Image

Back in the GDPR

Dan Panitz & H. Bruce Gordon

Any company operating globally should protect its value through exposure containment under both privacy shield and the forthcoming GDPR.

Features

What You Need to Know to Get Started with Privacy Shield Certification Image

What You Need to Know to Get Started with Privacy Shield Certification

David F. Katz

If your company maintains operations in the European Union or is U.S. based but obtaining personal data from European citizens, you will need to strongly consider obtaining certification under the new Privacy Shield framework. Certification began in August 2016, and will make compliance with EU privacy laws when transferring data to the U.S. possible for the immediate future.

Features

Is Your Law Firm Running 'Encryption Light?' Image

Is Your Law Firm Running 'Encryption Light?'

Nina Cunningham

With so many warnings to lawyers about transmitting unsecured email and attachments, it can be difficult to understand the solutions available and how they differ. Some may improve security but make communications cumbersome. If too cumbersome, users seek a way to work around them or choose less powerful tools.

Features

Building a Business Case for a Data Privacy Program Image

Building a Business Case for a Data Privacy Program

Heidi Maher

When members of the Compliance, Governance and Oversight Council (CGOC) discuss data privacy and security today, I see an entirely new level of urgency.…

Features

Search Warrants for IoT Data Spur Legal, Privacy Complications Image

Search Warrants for IoT Data Spur Legal, Privacy Complications

Ricci Dipshan

<b><i><font size="-1"> Law Enforcement Attempts to Access Amazon Echo Raise Questions over the Viability of IoT Data in Investigations and the Vulnerability of Private Information</b></i></font><p>A case surrounding a mysterious death in a Benton County, AR, has far-reaching implications for the ownership and privacy of data generated from Internet-connected devices.

Features

<i>Online Extra</i><br>DOL Sues Google Over Failure to Provide Compensation Data Image

<i>Online Extra</i><br>DOL Sues Google Over Failure to Provide Compensation Data

Rebekah Mintzer

The Department of Labor (DOL) is asking an administrative law judge to order the company to turn over information on job and salary history for employees…

Features

Virtual Snooping Image

Virtual Snooping

Karen Ellis

The modern-day snoop is all too often someone you know. If this consideration doesn't leave you paranoid and looking over your shoulder, it should.

Features

Presidential Cybersecurity Handoff Image

Presidential Cybersecurity Handoff

Justin Hectus

Given the pending change in administration and uncertainty around President-elect Trump's priorities on cybersecurity, an analysis of the current federal cyber landscape may yield insights into how the next administration might prioritize their approach on this important front.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Bankruptcy Sales: Finding a Diamond In the Rough
    There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›