Features
Perspective on Impact of COVID-19 on Entertainment Industry
Leslie José Zigel, Chair of the Entertainment, Media & Technology Group at Greenspoon Marder offers his thoughts on entertainment industry issues arising out of the COVID-19 pandemic.
Features
Privacy Is Top Priority But Spending Will Decrease, Survey Says
Exterro's Annual Study of Legal Spend Management indicates that organizations are expecting to spend less on compliance with privacy laws in 2020 as they wait to see how new regulations like the CCPA are enforced first.
Features
COVID-19: Cybersecurity and Insurance Coverage
When cyber attacks succeed, in-house counsel and risk management professionals will look for coverage under their cyber insurance policies. Insurance coverage for such incidents, however, are also present in other policies, and these other policies should not be cast aside.
Features
TRO Bid in Arts Case Results in COVID-19 Rebuke from Judge
At this moment in COVID-19 time, if your case involved stopping the sale of counterfeit unicorn products on the Internet, sorry, that wouldn't be an emergency. That was the message from U.S. District Judge Steven C. Seeger, in a decision denying a request for a temporary restraining order filed on behalf of Art Ask Agency, the exclusive licensee for the fantasy art of British artist Anne Stokes, who is popular among the Dungeons and Dragons crowd.
Features
COVID-19: How to Keep Cybersecurity in Mind When Negotiating Work-From-Home Vendor Contracts
COVID-19 spurred an overnight surge in demand for work-from-home vendors — from videoconferencing companies to cloud service providers. This caused some companies to rush into service contracts without fully appreciating the privacy and cybersecurity risks involved.
Features
Legal Tech: Preparing for Internal Investigations to Mitigate Risk
How Advanced E-discovery Tools Can Help Simplify Information Gathering, Unify Disparate Information Systems, Standardize Workflows Across Departments, and Reduce Both Costs and Risk The stakes in internal investigations can turn out to be very high. Companies can often respond effectively if they proactively plan for investigations and leverage technology that can comb through large amounts of data quickly at low cost.
Features
Legal Tech: 7 Steps to Make Your E-Discovery Process Pandemic and Recession-Ready
For the legal profession in general, and e-discovery specifically, one of the biggest ways a recession is felt is through litigation budget pressure. To weather a recession, we need to be prepared to do more with fewer resources.
Features
Judge Warns Facebook in Approving Record $5B Fine for Alleged Privacy Violations
The Judge Pointed Out that Some FTC Commissioners Wanted to Specifically Sanction Facebook Founder Mark Zuckerberg for the Company Sharing Private User Data With Outside Parties A federal judge in Washington, DC, signed off on a record $5 billion fine imposed by the U.S. Federal Trade Commission on Facebook for allegedly violating federal law and a previous order with its privacy practices.
Features
Coronavirus Work-from-Home Response A Boon for Cybercriminal Exploitation
Companies determined to protect their employees and minimize the impact of COVID-19 are enforcing travel restrictions and strong work-from-home policies. However those actions can be used against employees as any firms are likely unprepared for the criminal appetite for the cyberattack exploitation of a remote workforce. Here are some of the key issues of which law firms and companies need to be aware and steps that should be considered to minimize the risk to keep everyone — and client data — safe.
Features
COVID-19: Threats Abound: How to Protect Your Remote Workforce
The COVID-19 pandemic has changed the conversation around remote work. As more employees work remotely, law firms must employ security best practices to ensure that the extended reliance on the cloud doesn't expose sensitive data or cripple daily operations. Following is a practical checklist of systems, technologies and processes to consider when evolving your firm for remote work and selecting your cloud technology provider.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- The Binding Effect of Plea Agreements In White Collar CrimesFederal plea agreements sometimes state explicitly that they are limited to that one office and do not bind other U.S. attorney's offices. In this article, we discuss the circuit courts' competing approaches to interpreting the binding effect of plea agreements and the Department of Justice policy.Read More ›
- Authentic Communications Today Increase Success for Value-Driven ClientsAs the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›