Features
Privacy and Security of Personal Information Collected by Employee Benefit Plans
High profile cyberattacks and data breaches have become routine occurrences. Cyber threats are so pervasive that many privacy and security experts advise that responsible parties ' like fiduciaries of employee benefit plans ' should prepare for <i>when</i> a data breach occurs, not <i>if</i>. Data collected by employee benefit plans includes sensitive information that makes them a particularly attractive target for cybercrime.
Features
Cybersecurity Beyond Traditional Risk Management
At a recent CIO panel, an audience member asked the three of us on stage: "What do you see as your number one priority in the coming 12 months?" I responded "cybersecurity" without hesitation. The panelist that followed said that cybersecurity was a priority, but that it is a subset of risk management. This was not the first time I have heard the chief information pro and/or technologist in a large company make that point, and I have to respectfully disagree.
Features
Online e-Discovery Ethics
Although attorneys are rapidly becoming familiar with structuring digital data requests and responding to those requests in a way that is thorough, but reasonable, most attorneys feel at sea in the e-discovery ethics arena.
Columns & Departments
Movers & Shakers
A Collection of Moves in the Cybersecurity and Privacy Practice Areas
Features
<i>Pok'mon Go</i> Raises a Variety of Liability Issues
Every generation has its own new fads, which can sweep across the country, if not the world, seemingly from nowhere, capturing the imagination and attention of millions. With the exception of a few fads, these activities, however brilliant or mindless, do not create legal issues and potential litigation involving those who participate. <i>Pok'mon Go</i> is one of those exceptions.
Columns & Departments
cyberSecure Conference
ALM's cyberSecure conference takes place Sept. 27-28 in New York. ALM cyberSecure is designed to provide business executives with the necessary tools to build and deploy a successful adaptive cybersecurity plan that comprehensively addresses detection, defense and response.
Features
How to Understand and Protect the Data in Your Enterprise
Especially in a time where cybersecurity remains in the headlines on a regular basis, it's crucial to understand what data exists in order to protect it. Where's your data? What if you lost track of some of it? What if attackers copied it?
Columns & Departments
<b><i>Legal Tech:</b></i> Modernizing Litigation Practice: What Can the U.S. Learn from Electronic Courtrooms and Paperless Trials Abroad?
Legal professionals interested in the next wave of innovation in litigation technology can look overseas to the developments over the last several years in the UK and Singapore.
Features
Five Steps to a Successful Social Media Strategy
Have you heard? Social media is mainstream ' 70% of the U.S.are using social media and more than 50% of them are over the age of 35 (that's right ' it's not just millennials). But did you know that in-house counsel are active social media participants? In fact, their usage is growing and today nearly two-thirds of general counsel (GCs) are engaging at least weekly in social media for professional reasons.
Features
Contracting With a Fintech Company
Your favorite internal client has just messaged you about a new contract that needs a rush review. The counterparty is reportedly one of the hottest new "fintech" companies in Silicon Valley. You are the master of all things vendor contract-related in your shop, but perhaps this is the first fintech contract to cross your desk. This article addresses some of the special issues that might be presented by this sort of contract.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- The Binding Effect of Plea Agreements In White Collar CrimesFederal plea agreements sometimes state explicitly that they are limited to that one office and do not bind other U.S. attorney's offices. In this article, we discuss the circuit courts' competing approaches to interpreting the binding effect of plea agreements and the Department of Justice policy.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›
- Issues in Reverse Morals Clauses In Talent Influencer Contracts With Product BrandsThe next company general counsel to slide a morality clause across the desk for a celebrity or web influencer to sign shouldn't be surprised if that talent also whips out a morals clause, one to cancel the contract if the company's brand acts immorally.Read More ›