Features
Application of Bankruptcy Law to Internet Assets
Internet assets generally, and Internet asset licenses in particular, are increasingly subject to bankruptcy proceedings.
Features
The 'Soft Underbelly' of Cybersecurity Meets Legal Ethics
Legal departments for business organizations rate cybersecurity, regulation and ethics compliance among their chief concerns, and they are well aware of surveys showing law firms to be the "soft underbelly" of business security due to weakness of their cybersecurity.
Features
A 'Loss' Under the CFAA Does Not Require Interruption of Service
This article focuses on what federal appellate courts agree upon with regard to the text of the CFAA.
Features
<b><i>Online Extra</b></i><br>Are You Ready for the New China Cybersecurity Law?
<b><i>A Consilio Survey Found 75% of Legal Tech Professionals Are Unfamiliar with the Law, But Multinational Companies Can Still Prepare Before the June Implementation</b></i><p>In December 2016, China passed a comprehensive Cybersecurity Law, expanding the country's data localization requirement once it goes into effect this June and sparking heated debate among Chinese lawmakers. Some experts say even more legislation could be on the way.
Features
Beware the W-2 Phishing Scam
In 2016, numerous businesses fell victim to a surge of phishing scams involving W-2 forms. In response, the IRS sent a broad consumer alert regarding these schemes after seeing an approximate 400% surge in phishing and malware attacks during the 2016 season. As the tax filing season ramps up for 2017, we have already seen a number of successful attempts to obtain W-2 forms from unsuspecting employees.
Features
Three Things Law Firms Should Consider When Using Website Metrics
<b><i>Google Analytics Can Prove a Useful Tool in Helping Firms Draw More Clients</b></i><br>Many law firms proclaim their excellence by touting top lawyers from prestigious schools and decades of courtroom success. While these facts still afford some strategic advantages, an effective content marketing strategy is another way to gain an edge over your competition in today's legal market.
Features
The Evolution of the 'Virtual Law Firm'
<b><i>Though 'Virtual Firms' Are on the Decline, Cloud Technology May Be Shifting the Model to Refocus on Lawyer Mobility</b></i><br>The rise of cloud computing in particular has made it possible for attorneys to keep all the technology tools they need to practice on hand at all times, and eschew direct client contact and office space if so desired.
Features
Cybersecurity Insurance<br><b><i><font="-1">Untangling the Mystery</b></i></font>
High-profile breaches have encouraged many businesses to proactively assess their cyber liabilities, and implement prevention and response plans. Fortunately, there are more technology options available to protect businesses than ever before, and both the U.S. government and private industry have made great strides in understanding and combating some of the most common cyber threats.
Features
Untangling the Mystery of Cybersecurity Insurance
There are more technology options available to protect businesses than ever before, and both the U.S. government and private industry have made great strides in understanding and combating some of the most common cyber threats.
Features
The Constitutionality of Using Cell-Site Simulators
According to the Department of Justice Policy Guidance: Use of Cell-Site Simulator Technology (Sept. 3, 2015), a cell-site simulator “function[s] by…
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- The Binding Effect of Plea Agreements In White Collar CrimesFederal plea agreements sometimes state explicitly that they are limited to that one office and do not bind other U.S. attorney's offices. In this article, we discuss the circuit courts' competing approaches to interpreting the binding effect of plea agreements and the Department of Justice policy.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›
- Issues in Reverse Morals Clauses In Talent Influencer Contracts With Product BrandsThe next company general counsel to slide a morality clause across the desk for a celebrity or web influencer to sign shouldn't be surprised if that talent also whips out a morals clause, one to cancel the contract if the company's brand acts immorally.Read More ›