Features
Legal Tech: Twitter's Future and E-discovery
Whether Twitter's doomsday is coming is still uncertain. But the threat of loss of years' worth of companies' data could be the impetus behind testing collection tools and reevaluating e-discovery processes.
Features
Incident Response Plans and Tabletop Exercises May Be A Waste of Time
Developing and delivering an IRP or TTE to improve the effectiveness of your incident response approach, in isolation, does not work. If your incident response preparation activity does not include some fundamental tactical actions, when the time comes and your house is on fire, your breach response will fail to meet your expectations.
Features
Hot Button Enforcement Issues In the New Canadian Consumer Privacy Protection Act
Part Four In a Series The conclusion of the series on Canada's recently introduced Consumer Privacy Protection Act looks at hot button enforcement issues in the Act.
Features
The Great Resignation and Its Impact on Legal Department Contract Workflows & KM
Like other organizations, including law firms, in-house legal departments have not been spared from the "great resignation." Lawyers and professionals across all industries are actively seeking new opportunities for a host of reasons including better pay, better culture and better balance. When they leave, they take with them not just their talent but the institutional knowledge they've accumulated, while their former team members are left to piece things together.
Features
Arm Yourself Against Crypto Regulatory Uncertainty
The promise that the crypto and digital assets markets bring comes bundled with uncertainty — especially on the regulatory front. Until jurisdictions adopt unified and consistent frameworks that account for the unique facets and features of cryptocurrencies, institutional investors and other market participants must keep abreast of ever-changing, dynamic laws to avoid sanctions and fines.
Features
Courts Strictly Construing Cyber Insurance Policies, Finding Coverage Is Narrow
In several recent cases, companies with cyber insurance discovered that provisions in these policies led their insurers to limit coverage. Courts have been strictly construing cyber policies, and have found that the coverage provided is narrow. These decisions hinged upon whether an event constituted a covered "direct" loss and whether intervening actions precluded coverage, like an employee responding to fraudulent communications.
Features
Evolution of the Standing Requirement In Data Breach Class Actions
As the landscape of cybersecurity and data privacy continues to evolve, so do the requirements needed to establish standing in regard to the type of harm suffered as a result of a data breach. Moreover, there has been a shift in the requirements needed to hold an organization legally and financially responsible for data stolen during a data breach.
Features
Cybercrime and Bankruptcy: The Crypto Winter
It comes as no surprise that the crypto winter has reinforced the perception of critics that digital currencies are "risky, flawed and unproven digital financial instruments." This article analyzes the state of the cryptocurrency market and examines the impact of cybercrimes and crypto bankruptcies on the current market.
Features
The Information Governance Groundhog Day Syndrome
Security and privacy start with good information governance, and for many firms — trying to get their information governance policy implemented feels a lot like Groundhog Day. Yes, the one with Bill Murray. Let's take a closer look.
Features
Compliance for Privacy Officers on the New Canadian Consumer Privacy Protection Act
Part Three In a Series Part Three continues the analysis of new compliance requirements in Canada's new Consumer Privacy Protection Act, including the content of organizational privacy policies and anonymization of personal information policies, and business transaction policies contained in the Act.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- Authentic Communications Today Increase Success for Value-Driven ClientsAs the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.Read More ›
- The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business AlliesPractical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.Read More ›
- The Binding Effect of Plea Agreements In White Collar CrimesFederal plea agreements sometimes state explicitly that they are limited to that one office and do not bind other U.S. attorney's offices. In this article, we discuss the circuit courts' competing approaches to interpreting the binding effect of plea agreements and the Department of Justice policy.Read More ›