Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

LJN Online Has A New Look … and Your Action Is Required Image

LJN Online Has A New Look … and Your Action Is Required

LJN Staff

Law Journal Newsletters Online is not only getting a new look, but is now fully integrated with ALM and its other offerings.

Features

<i>CYBER-ETHICS:</i> Technological Competence Obligations and the Interplay of the ABA Model Rules and Attorney Cybersecurity Image

<i>CYBER-ETHICS:</i> Technological Competence Obligations and the Interplay of the ABA Model Rules and Attorney Cybersecurity

Elizabeth (Lisa) Vandesteeg

The ABA has long published its Model Rules of Professional Conduct and modifies them from time-to-time to stay current with legal and technological developments and advances. While these Model Rules are not officially binding on attorneys, they have been adopted in large part by nearly every stateand provide a guideline for attorneys across the country regarding standards of professional responsibility and ethical conduct.

Features

Beats Headphones Royalty Dispute Saga Heads to Trial Image

Beats Headphones Royalty Dispute Saga Heads to Trial

Amanda Bronstad

Former hedge fund manager Steven Lamar, who helped launch Dr. Dre's Beats headphones a decade ago, won the right to go to trial against the rap artist and record producer after the California Court of Appeal revived his $100 million case over unpaid royalties.

Features

WB's Takedown Notices Aimed at Entertainment Co.'s Own Websites Image

WB's Takedown Notices Aimed at Entertainment Co.'s Own Websites

Jennifer Williams-Alvarez

Critics of the DMCA got some ammunition recently, when Warner Bros. asked Google to take down hundreds of copyright-infringing websites ' only to later realize that it had included legitimate sites and some of the entertainment company's own official pages. The blunder dredges up questions about whether the current notice-and-takedown system is working for both copyright owners and service providers.

Features

Supreme Court Term Promises to Be IP Blockbuster Image

Supreme Court Term Promises to Be IP Blockbuster

Scott Graham

With four IP cases on the docket and several more knocking at the door of certiorari, the U.S. Supreme Court is poised for a banner year of patent, trademark and copyright decisions.

Features

Privacy and Security of Personal Information Collected by Benefit Plans Image

Privacy and Security of Personal Information Collected by Benefit Plans

Marc Bussone

High profile cyberattacks and data breaches have become routine occurrences. Cyber threats are so pervasive that many privacy and security experts advise that responsible parties ' like fiduciaries of employee benefit plans ' should prepare for <i>when</i> a data breach occurs, not </i>if</i>. Plan sponsors and fiduciaries should be aware of, and address, security and privacy issues in connection with personal information.

Features

Data Breach Prevention and Information Governance Go Hand-In-Hand Image

Data Breach Prevention and Information Governance Go Hand-In-Hand

Jake Frazier

Information governance has a wide range of varying definitions, depending on whom you ask. Some consider it to be an amorphous collection of policies that are difficult to translate into the real world. Others view it as a holistic strategy document, or a series of discrete, tactical projects that implement best practices in data security or storage optimization.

Features

China's Second Draft Cybersecurity Law's Expanded Data Localization Requirement Image

China's Second Draft Cybersecurity Law's Expanded Data Localization Requirement

Tiana Zhang, Jodi Wu, Sally Han & Mike He

Cybersecurity has remained a priority for the Chinese government in 2016. The second draft of the Cybersecurity Law was released for public comment on July 5, 2016. Although still in draft form, when it is adopted, the Cybersecurity Law will impose a number of requirements on companies with business operations within the territory of China that have been subject to heated discussions among multinational companies (MNCs).

Features

Cybersecurity Comes Together in Legal and Finance Image

Cybersecurity Comes Together in Legal and Finance

Ricci Dipshan

Since the dawn of the new millennium, technology has been expanding the reach and ability of criminals at breakneck speeds. Regulators have constantly found themselves running behind a new era of cyberthreats and dangers, struggling to respond to accidents while fortifying the road ahead.

Features

Four Ways Big Data Can Help Win Your Next Case Image

Four Ways Big Data Can Help Win Your Next Case

Lauren Bakewell

Analyzing data and providing the right kind of data is critically important to every aspect of legal activities. When you're expecting data to act as a secret weapon in the sales process, the courtroom, or to provide a strong foundation for your firm, the quality of your information is priceless. To uphold your firm's integrity and ensure its success, it's time to get your staffers off Google and arm them with data intelligence.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • How Secure Is the AI System Your Law Firm Is Using?
    What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
    Read More ›
  • Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary Support
    The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.
    Read More ›
  • Compliance and Third-Party Risk Management
    To gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.
    Read More ›