Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

The Rise of False Claims Act Cybersecurity Litigation Image

The Rise of False Claims Act Cybersecurity Litigation

Annie Railton, James Gatta, Jud Welle & Emily Notini

While the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.

Features

Diversity & Technology: Training Your AI to Be More Inclusive Image

Diversity & Technology: Training Your AI to Be More Inclusive

Aaron Lee

AI is maturing and creating countless new opportunities to help people live better lives at home and work. As the technology evolves, it is essential that it does so inclusively, equally recognizing and serving all individuals who make up the world's population.

Features

Legal Tech: The Risks and Rewards of Interweaving Legal Technologies Image

Legal Tech: The Risks and Rewards of Interweaving Legal Technologies

Haydn Jones

The trend of legal technology companies working in concert to either overcome a mutual competitor, offer a stronger solution to existing clients, or a combination of the two is a strategic approach that is beginning to become a signature of the space.

Features

Innovation In a Hyper-Competitive Market Image

Innovation In a Hyper-Competitive Market

Ari Kaplan

The results of interviewing 30 chief talent officers along with directors and managers of recruiting reveal the impact of the pandemic on entry-level and lateral hiring, the appetite for leveraging technology to address the rapid acceleration in on-campus interviewing and lateral recruitment, and the increased focus on innovation to fuel law firm success.

Features

Building AI and Machine Learning Technologies: Data Licensing Tips and Traps Image

Building AI and Machine Learning Technologies: Data Licensing Tips and Traps

Anna Remis

Data is the fuel for software development, and developers use historical data from existing products to train algorithms and build AI and machine learning models. Companies are well aware of privacy and regulatory restrictions on data use, but often do not consider the potential impact of data use restrictions on intellectual property ownership and use rights.

Features

Cybersecurity and Legal Tech In 2022: Predictions from the Field: Part Two Image

Cybersecurity and Legal Tech In 2022: Predictions from the Field: Part Two

Zach Warren & ssalkin

Predictions from experts continue, with a look at what 2022 might hold in next generation technology, legal operations and contract review.

Features

The Top 10 2022 Job Market Predictions in Legal Technology Image

The Top 10 2022 Job Market Predictions in Legal Technology

Jared Coseglia

In 2022 hiring will remain the top obstacle to business fulfillment across the e-discovery, data privacy, and cybersecurity landscapes. Here's how to stay a cut above the competition — whether you are an employer or a job seeker.

Features

Landscape of Standalone Cybersecurity Policies Has Changed Due to Increased Risk and Scrutiny Image

Landscape of Standalone Cybersecurity Policies Has Changed Due to Increased Risk and Scrutiny

Walter Andrews, Andrea DeField & Sima Kazmir

Because the market is rapidly changing, policyholders should not expect that they'll be offered the same coverage at renewal. Policyholders should start their renewal process earlier going into this year's renewal so they have time to analyze new pricing, as well as new endorsements that may limit coverage and consider alternative forms, insurers, and policies to maximize coverage.

Features

Inside Cryptocurrency Pump-and-Dump Schemes Image

Inside Cryptocurrency Pump-and-Dump Schemes

Jonathan Bick

Since the inception of cryptocurrency as a widely traded asset, there has been increasing opportunity to make money through market manipulation, specifically through classic pump-and-dump and related fraudulent schemes, and more specifically CPDs.

Features

Legal Tech: Effective Preservation Measures In Litigation Readiness Image

Legal Tech: Effective Preservation Measures In Litigation Readiness

Philip Favro

Basic ESI preservation steps, including litigation holds, relevant source checklists, and follow up steps with custodians may not be enough in some instances. Given the frequency of data loss from custodial and non-custodial sources, companies should also consider incorporating remediation strategies into their approach to preservation to better ensure defensibility.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES