Features
CFPB Takes Step Into Cybersecurity Regulation
The Consumer Financial Protection Bureau (CFPB) has fired a shot across the bow of the burgeoning online-payment industry, taking an enforcement action this week that marked the agency's first foray into regulating cybersecurity.
Features
<b><i>Online Extra:</b></i> Malware Increasingly Making Its Way into Organizations Through Social Media
To say 'social media is everywhere' these days may be slightly archaic. Of course it's everywhere. Chances are, you're reading this article with at least one social media application running or open in a browser right now. But why, then, aren't these social media platforms as secure as they could be? A new 'Best Practices for Social Media Archiving and Security' survey from Osterman Research found that although enterprise and consumer-focused social platforms abound in modern organizations, social media remains a threat for many companies.
Features
<b><i>Online Extra:</b></i> Dozens of Big Firms Targeted by Hacker Seeking M&A Info
For several years law firms have been a key target for hackers seeking to obtain confidential information about initial public offerings, intellectual property and M&A deals, claim cybersecurity consultants, but rarely does word about specific attacks become public.On March 29, Crain's Chicago Business reported that 48 top firms, most of which appear in the Am Law 100 rankings, were targeted recently by a Russian hacker living in Ukraine seeking to trade on M&A information stolen from law firms.
Features
Top Security Intrusion Trends the Legal Community Should Watch
Lawyers are increasingly expected to understand the implications of cybersecurity when providing advice relating to a long list of matters that include privacy compliance, contract compliance, data breach response, data breach litigation, M&A due diligence, and insurance coverage. As a result, it is important that lawyers understand the latest trends in cyber intrusions that may expose their stakeholders to unwarranted risk and allow adversaries to exploit technical and human vulnerabilities.
Features
Internet Task Force Examines Copyright In the Digital Age
On Jan. 28, the Commerce Department issued a much-anticipated policy statement entitled "White Paper on Remixes, First Sale and Statutory Damages: Copyright Policy, Creativity, and Innovation in the Digital Economy." This article briefly describes the white paper's scope and recommendations, with a focus on the issue of statutory damages, as to which the white paper proposes several amendments to the current Copyright Act.
Features
Enterprise Legal Management
The function of legal departments has shifted from primarily managing legal matters and costs to acting as revenue generators that provide information and analytics valuable to the entire company. This article offers a primer about enterprise legal management (ELM).
Features
Privacy v. Data Security
The year 2005 really marked the beginning of the "era of data breaches," and with it, the "era of data breach lawsuits." In its place, what is now commonplace in the wake of major data breaches ' class action "privacy" litigation on behalf of data subjects, seeking millions of dollars in damages, under a dizzying array of legal theories.
Features
Cost Recovery in 2016
2016 is in full swing and we will soon be conducting the 2016 Mattern & Associates Cost Recovery Survey. We've been conducting this bi-annual survey since 2004 and, during that time, it has become an industry resource for tracking the cost recovery practices of law firms across size and geography.
Features
<b><i>Case Study</b></i>LAZINGA!: An Advanced Online Directory for Legal Professionals
My law firm is always looking for ways to simplify day-to-day processes. This includes having the most up-to-date software systems, streamlined and manageable billing systems, and the most cost effective ways to resource qualified temporary and permanent staffing.
Features
<b><i>Online Extra:</b></i> FDIC Chimes In on Cybersecurity
The Federal Deposit Insurance Corporation is the latest entity to release a framework for cybersecurity.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business AlliesPractical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.Read More ›
- Issues in Reverse Morals Clauses In Talent Influencer Contracts With Product BrandsThe next company general counsel to slide a morality clause across the desk for a celebrity or web influencer to sign shouldn't be surprised if that talent also whips out a morals clause, one to cancel the contract if the company's brand acts immorally.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›