Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

When Courts Push Back: The New e-Discovery Proportionality Standard for Mobile Data Image

When Courts Push Back: The New e-Discovery Proportionality Standard for Mobile Data

Michael D’Angelo

Mobile discovery has reached an inflection point. Courts spent 2024 handing out sanctions for two opposite failures: failing to preserve mobile data and collecting far too much of it. Litigants now face a genuine discovery double bind, including being punished for being careless and being punished again for being overly aggressive. That push-pull (collect more vs. collect less) is shaping the 2025 e-discovery landscape more than any technical development or new tool.

Features

New Texas AI Act Takes Effect Image

New Texas AI Act Takes Effect

Laura Lorek

The Texas Responsible Artificial Intelligence Governance Act (TRAIGA) takes effect Jan. 1, 2026 andlimits the use of AI for social scoring and activities that legislators say violate constitutional rights. It also sets up a regulatory sandbox for testing and create an Artificial Intelligence Council to provide guidance.

Features

Chief District Judges Now Require Sealed Documents Outside of E-Filing System As Safeguard Image

Chief District Judges Now Require Sealed Documents Outside of E-Filing System As Safeguard

Sulaiman Abdur-Rahman

U.S. chief district judges in multiple jurisdictions, including the Southern District of New York and Eastern District of Virginia, now require parties to serve opposing counsel with sealed documents outside of the federal judiciary’s electronic filing system following recent cyberattacks on the judiciary’s virtual assets.

Features

Report: Corporate Law Departments Aren’t Tracking AI Performance Image

Report: Corporate Law Departments Aren’t Tracking AI Performance

Ella Sherman

While many corporate legal departments have been able to track their spending, few are tracking their outcome-based performance metrics, according to a report from Everlaw and the Association of Corporate Counsel (ACC).

Features

Use a WISP As a Roadmap to Detail Data Security Processes and Controls Image

Use a WISP As a Roadmap to Detail Data Security Processes and Controls

Alfred R. Brunetti

The written information security plan (WISP) is not just another compliance document, it's a practical roadmap that turns abstract data protection duties into concrete business practices.

Features

From Reactive to Proactive: Navigating AI, Privacy and Security Compliance Across APAC’s Expanding Regulatory Landscape - Part Two Image

From Reactive to Proactive: Navigating AI, Privacy and Security Compliance Across APAC’s Expanding Regulatory Landscape - Part Two

Brandon Hollinder & Jon Kessler

APAC is awash with recent changes in AI, privacy and cybersecurity regulations. Part one of this article examined the specifics of those changes and the paradigm shift they are precipitating. Part two explores the real-world implications of those changes and key takeaways for compliance teams.

Features

The Investigative Complexities of the TAKE IT DOWN Act Image

The Investigative Complexities of the TAKE IT DOWN Act

Johnathan Bridbord

The increasing prevalence of cyberstalking, harmful deepfakes and online harassment is creating profound risks for individuals and organizations. So much so that Congress has implemented a federal statute designed to shift liability toward online platforms and provide victims with enforceable removal rights.

Features

Five Operational Foundations To Determine Whether Your Tech Investments Will Succeed In 2026 Image

Five Operational Foundations To Determine Whether Your Tech Investments Will Succeed In 2026

Rick A. Campbell

Law firms are spending record amounts on technology right now. The difference between technology investments that succeed and those that fail may have less to do with the tools themselves than the operational foundation beneath them.

Features

Use a WISP to Detail Data Security Processes and Controls Image

Use a WISP to Detail Data Security Processes and Controls

Alfred R. Brunetti

The written information security plan (WISP) is not just another compliance document, it's a practical roadmap that turns abstract data protection duties into concrete business practices.

Features

AWS Outage Demonstrates Risks of Cloud Services Image

AWS Outage Demonstrates Risks of Cloud Services

Brendan Pierson

The recent Amazon Web Services outage, which incapacitated online services across the country, highlights risks companies must manage as they increasingly depend on cloud services, lawyers say.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES