Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Senate Votes to Repeal FCC Internet Privacy Rules Image

Senate Votes to Repeal FCC Internet Privacy Rules

Lora Hollien

The FCC's move to stop Internet service providers from collecting customers' personal information without consent has itself been halted. The Senate voted 50-48 on March 24 to overturn the rules, with the House expected to follow suit.

Features

Got a Negative Online Review? First Things First: Turn Off Your Attorney Image

Got a Negative Online Review? First Things First: Turn Off Your Attorney

Dan Lear

It happened. Some current or former client had the gall to write something less than flattering about you online. What do you do? The first thing to do, and this can be the hardest thing for attorneys, is to turn off your attorney. Feedback can be hard to take.

Features

Protecting Your Clients from Their Own Social Media Image

Protecting Your Clients from Their Own Social Media

Ben Rubinowitz & Evan Torgan

Postings of comments or photographs become part of the permanent record on the Internet. There is no such thing as deleting a post or erasing the past. Because of the potentially adverse consequences, trial lawyers are now duty bound to run a thorough social media search of their clients, adversaries, and witnesses in every case. To the extent an attorney fails to conduct such a search, not only will she be at a severe disadvantage in the case but her competence as a trial lawyer can be called into question.

Features

Back in the GDPR Image

Back in the GDPR

Dan Panitz & H. Bruce Gordon

Any company operating globally should protect its value through exposure containment under both privacy shield and the forthcoming GDPR.

Features

User Behavior Analytics and Your Company's Data Image

User Behavior Analytics and Your Company's Data

Jason Straight

While cybersecurity spending at many organizations still tends to focus on perimeter defenses, security experts have begun to face the reality that it is nearly impossible to keep bad actors out of your network, and are turning their attention to better ways of mitigating threats posed by intruders once they've hacked their way in.

Features

<b><i>Legal Tech</b></i><br>Making Sense of New Data Types in the App Age Image

<b><i>Legal Tech</b></i><br>Making Sense of New Data Types in the App Age

Tim Anderson & JR Jenkins

While the threat of "big data" — massive amounts of data inside an organization — has cast a shadow over IT and legal departments for several years, the real challenge can oftentimes be the variety. It's why we believe the real challenge is less about "big data" and more about "new data types" — that quickly defeat traditional collection and review tools and strategies.

Features

<b><i>Online Extra</b></i><br>What Companies Can Demand From Law Firms on Data Security Image

<b><i>Online Extra</b></i><br>What Companies Can Demand From Law Firms on Data Security

C. Ryan Barber

Association of Corporate Counsel Releases First Set of Model Cybersecurity Practices

Features

<b><i>Online Extra</b></i><br>Free Online Access to Georgia's Legal Code Violates Copyright, Judge Says Image

<b><i>Online Extra</b></i><br>Free Online Access to Georgia's Legal Code Violates Copyright, Judge Says

R. Robin McDonald

One day after a federal judge in Atlanta ruled that the state of Georgia may copyright its official legal code and pursue infringers, a California public records activist who had made Georgia's code available for free to the general public began work on an appeal.

Features

<i><b>Online Extra</b></i><br> Are Law Departments Letting Law Firms Off the Hook When it Comes to Cybersecurity? Image

<i><b>Online Extra</b></i><br> Are Law Departments Letting Law Firms Off the Hook When it Comes to Cybersecurity?

Daniella Isaacson

It is time for a reality check on cybersecurity. Our research has focused on the threat that data breaches present to law firms and law departments independently, but the interplay between cybersecurity at law firms and law departments is increasingly impossible to ignore.

Features

Untangling the Mystery of Cybersecurity Insurance Image

Untangling the Mystery of Cybersecurity Insurance

Sean B. Cooney

IT security professionals used to warn that only two types of businesses exist: those that have been hacked, and those that will be. Now, many are even more pessimistic, and divide the world's businesses into companies that know that they have been hacked, and those that don't. Law firms are juicy targets with all the personal identifiable information (PII) contained in client files. Intellectual property practices are especially attractive to cyber thieves because of the value of patent, trademark and trade secret information.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES