Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


Protecting Your Company's Data from Security Breaches
November 02, 2015
This article explores some steps counsel can take to protect their organizations from a data breach, and how counsel can proactively help to mitigate any adverse impact in the unfortunate event a data breach occurs.
The Art of Cyberwarfare
November 02, 2015
Cybersecurity is at a crossroads. No longer resigned to the confines of server rooms overseen by information technology, decisions regarding the protection of data have been forced into the boardroom by events that include breaches at main street businesses and revelations of clandestine government hacking activities.
Attacking the Electronic Medical Record
November 02, 2015
The electronic age has paved the way for speedy retrieval of medical records. But the problem is that the electronic record is only as good as the individuals who input the information into the record itself.
Data Sharing In the Cloud
November 02, 2015
Storing and sharing data "in the cloud" has become, in many instances, a business necessity. The practical and economic advantages of cloud computing are clear ' it eliminates the need to send client data via traditional, costly methods, and is significantly less expensive than building and maintaining the same data storage capacity in-house.
Court Watch
November 02, 2015
Franchisees and Dealers Should Plead Causation In Actions Against the Government <br>Michigan Court Transfers Case Brought By 41 Franchisees to Franchisor's Home State
How to Fix Reputational Harm
November 02, 2015
The speed with which negative Internet postings spread can cause immediate reputational harm. To remedy this harm, the nature and extent of the damage must be quantified, which is no easy task. However, new digital tools can now be used to assess and quantify damage caused by these kinds of negative Internet postings.
Managing Security Risks During Labor Disputes
November 02, 2015
Every company with union workers faces the risk of a labor dispute. Identifying any business risks and then managing them is a priority for executive decision-makers who must ensure that the company delivers its promises to stockholders, customers and employees. The process is well defined in business terms:
The Ethical Duty to Be Competent in Technology and eDiscovery
November 02, 2015
Lawyers understand that they have an ethical duty to remain competent in the law and its practice. But far fewer are aware that an emerging body of legal-ethics rules and opinions say that lawyers also have a duty to be competent in relevant technology.
<b><i>Online Extra:</b></i> NJ Legislature Moves on Cybersecurity Bill
October 06, 2015
The New Jersey Legislature on Oct. 5 began taking steps toward increasing its ability to combat cybercrime.
<b><i>Online Extra:</b></i> Google, Microsoft Strike Patent Peace Deal
October 05, 2015
Microsoft Corp. and Google Inc. have buried the hatchet on five years of patent litigation.The companies issued a joint statement on Sept. 30 announcing the conclusion of 20 cases being litigated in the United States and Europe. The agreement comes a week after a U.S. Court of Appeals for the Ninth Circuit decision resolving one of their most prominent disputes.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • How the U.S.-China Trade War Effects IP Strategy
    The trade war between the United States and China has had far-reaching effects on international trade and the global economy. The dispute is slowly developing into a battle of attrition, without any immediate resolution on the horizon despite ongoing trade talks. As businesses change the way they operate in response to this unpredictable trade environment, counsel should consider the risks and potential impacts on corporate IP strategy.
    Read More ›
  • Legal Possession: What Does It Mean?
    Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
    Read More ›