Features
AI Poisoning: A Self Help Cybersecurity Option
A novel legal self-help technique to secure artificial intelligence data and programs is known as Poisoning AI. This technique involves modifying the AI algorithm to intentionally produce specific erroneous results.
Features
How Secure Is the AI System Your Law Firm Is Using?
In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.
Features
Generative AI and the 2024 Elections: Risks, Realities, and Lessons for Businesses
GenAI's ability to produce highly sophisticated and convincing content at a fraction of the previous cost has raised fears that it could amplify misinformation. The dissemination of fake audio, images and text could reshape how voters perceive candidates and parties. Businesses, too, face challenges in managing their reputations and navigating this new terrain of manipulated content.
Features
Hyperlinked Documents: The Latest e-Discovery Challenge
As courts and discovery experts debate whether hyperlinked content should be treated the same as traditional attachments, legal practitioners are grappling with the technical and legal complexities of collecting, analyzing and reviewing these documents in real-world cases.
Features
DOJ's Cyber Fraud Initiative Is a Wake-Up Call That Keeps Ringing
The DOJ's Cyber-Fraud Initiative's results and DOJ's guidance on corporate compliance have made the point to government contractors and corporate America — "now is the time to invest and reinvest" in cybersecurity compliance.
Features
Are You For Real? Dealing with the Proliferation of Deepfakes
Notwithstanding the significant threats facing companies as a result of deepfake technology, there are several things companies can do to protect themselves and their employees from becoming the victim of a deepfake scam.
Features
China Finalizes New Regulations to Relax Personal Data Exports from China
Nearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.
Features
Privacy Risk Management & Data Minimization
Many organizations — from growing start-ups to mature, well-established companies — are struggling with the new reality of what it means to manage data in an era of digital transformation, exponential data growth, and expanding regulatory regimes focusing on data management and minimization.
Features
AI Needs Its 'Come to Jesus' Moment
It's time to stop the hype, stop talking up AI as if it's the next best thing since sliced bread and prove that it's a useful tool and technology that can actually be used in the actual practice of law.
Features
All the News That's Fit to Pinch: 'NYT v. OpenAI'
The emerging cases by authors and copyright owners challenging various generative AI programs for using copyrighted materials are certain to create new troubles for the courts being asked to apply the fair use doctrine to this important new technology.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Considerations When Entering Into a Tolling AgreementDefense counsel in complex white-collar investigations are often asked to waive these important protections by entering into tolling agreements, stopping the clock on the statute of limitations at issue. Whether such an agreement is actually in a target or subject's best interest presents a difficult question, and COVID-19 has impacted the calculus.Read More ›
- CoStar Wins Injunction for Breach-of-Contract Damages In CRE Database Access LawsuitLatham & Watkins helped the largest U.S. commercial real estate research company prevail in a breach-of-contract dispute in District of Columbia federal court.Read More ›
- 'Huguenot LLC v. Megalith Capital Group Fund I, L.P.': A Tutorial On Contract Liability for Real Estate PurchasersIn June 2024, the First Department decided Huguenot LLC v. Megalith Capital Group Fund I, L.P., which resolved a question of liability for a group of condominium apartment buyers and in so doing, touched on a wide range of issues about how contracts can obligate purchasers of real property.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›