The Human Factor In Information Security
No one can deny that cyberattacks are the new norm. Such risks will increasingly challenge our ability to operate our businesses. In the world of cybercrime, everyone — from individuals to nation-states — is a target. However, some targets are more alluring than others.
What Lawyers Can Learn from Uber, Redux
Lawyers need to know what the client wants and how to get them there before the process starts. Just like a driver who doesn't know exactly where he's taking his riders, a lawyer who isn't totally sure what a client wants — let alone how to get them there efficiently and effectively — is likely to end up with a client who is disgruntled.
Estate Planning for the Digital Afterlife
This article discusses the importance of accounting for digital assets in an estate plan, provides practical considerations for handling their disposition after death, and describes the current state of the law for the handling of digital assets after death.
<i>Online Extra</i> <br>Are Google's Confidentiality Agreements Illegal?
A current Google Inc. employee has sued the tech giant over its rules for protecting confidential information, alleging they prohibit workers from whistleblowing or even just complaining to their spouse about their boss. Employment lawyers say that if the allegations in the complaint are true — a big if, of course — Google's rules may well be overly restrictive.
The Human Factor In Information Security
No one can deny that cyberattacks are the new norm. Such risks will increasingly challenge our ability to operate our businesses. In the world of cybercrime, everyone — from individuals to nation-states — is a target. However, some targets are more alluring than others.
Cyberinsurance Considerations for Law Firms
Law firms spend a lot of time and effort to protect their clients' interests, but often overlook routine protection and security of clients' (and their own) data. While not a cure-all for data security risks, one important component to consider in putting together a comprehensive data security program is cyber insurance, as most general liability policies and professional liability policies now expressly exclude coverage for data breach claims.
Why the DMCA Needs to Be Modernized
It has been 18 years since the DMCA was signed into law. It was created to balance the security and rights of copyright holders with the growing influence of digital communications. But today it is facing serious criticism about its usefulness from every key stakeholder — creators, distributors and consumers alike.
Recent Disputes over Copyright Licenses
This article discusses disputes involving the use of copyrighted works or intellectual property underlying that work, under a license, or in one case, under an implied license. The parties thereto are not nearly as well-known, but the legal conclusions reached may have farther reaching implications.
Estate Planning for the Digital Afterlife
As more Americans establish personal email accounts, social media accounts, and other electronic accounts, these “digital assets” are becoming an increasingly vital estate-planning consideration. The failure to consider how to dispose of digital assets in an individual's estate plan could result in later complexities following the individual's death.
China Passes Controversial Internet Security Law
The Standing Committee of the National People's Congress, China's top legislature approved the new Cybersecurity Law on November 7, which was created for reasons of national security and to curb internet fraud. It will take effect in June 2017.