Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Data Privacy: Building Compliant and Adaptable Systems Image

Data Privacy: Building Compliant and Adaptable Systems

Tomas Suros

Rather than trying to institute changes to comply with every new privacy law as it emerges, a better approach is to view data privacy as an overall framework and adopt a holistic response to compliance with the built-in flexibility to constantly adapt to an ever-changing legal landscape.

Features

Cybersecurity Skills Update for 2020 Image

Cybersecurity Skills Update for 2020

Nina Cunningham

The demand for capable skilled professionals and team players in the information security industry is increasing. For those gaining skills to work in the industry for the first time, the challenge remains to hit the ground running with a position and, better, with a career path. Yet no career path in this industry will sidestep an ongoing foothold in the classroom — onsite or virtual.

Features

GDPR Had Some Bite in 2019 Image

GDPR Had Some Bite in 2019

Victoria Hudgins

Although no company was hit with the maximum GDPR fine of 4% of the company's worldwide annual revenue, GDPR fines issued in 2019 were still a force to be reckoned with.

Features

It's Legalweek Time Again Image

It's Legalweek Time Again

ssalkin & ljnstaff

This year, Legalweek will feature workshop boot camps, networking events, hundreds of exhibitors on the tradeshow floor and three conferences designed to address key issues at a functional level: LegalCIO, Legal Business Strategy, and, of course, Legaltech, the world's largest and longest running trade show for legal technology.

Features

Legal Tech: Babst Calland & Solvaire: An AI Contract Review Use Case Image

Legal Tech: Babst Calland & Solvaire: An AI Contract Review Use Case

Christian A. Farmakis

In today's business climate, clients demand greater efficiency when it comes to contract review for many complex deals and transactions. We have found that the combination of deep legal expertise, coupled with embracing carefully researched and vetted technology, is the most effective means of delivering high quality and timely review in an increasingly competitive marketplace.

Features

Insider Trading Policies and Cybersecurity Image

Insider Trading Policies and Cybersecurity

Michael J. Rivera & Abby I. Yi

Cybersecurity has been a high priority topic for the SEC the past few years. In September 2017, the SEC created a Cyber Unit within its Enforcement Division. This Cyber Unit had over 225 active investigations at the SEC's 2018 fiscal year end. The SEC has focused in particular on cybersecurity risks facing public companies.

Features

Effectively Managing Increasing Client Security Requirements Image

Effectively Managing Increasing Client Security Requirements

Christopher Perrotta

Gone are the days of naively assuming our confidential data is secure. Increasingly, clients, stakeholders, regulators and others are demanding proof that firms are actively protecting the PII to which they have access, and this evidence is being demanded both before and after security incidents. It is imperative law firms have the positions and processes in place to handle security incidents with urgency, accuracy and completeness.

Features

Law Firms Enter the Golden Age of Data Mining Image

Law Firms Enter the Golden Age of Data Mining

Doug Stansfield

As a matter of practice, law firms generate and store incomprehensible amounts of data. Most, if not all, of that data has been digitized and many firms that recognize the untapped value of their data have begun to leverage sophisticated technologies to mine it for reusable work product and valuable insights.

Features

Can Artificial Intelligence Fix Security Issues? Image

Can Artificial Intelligence Fix Security Issues?

Nina Cunningham

There is great enthusiasm about what AI can do to promote better living conditions, evoking wisdom, providing business intelligence through deep analysis of behavior and habits, by signaling trends and anticipating demand. But there are other considerations as well. A critical one is cybersecurity.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES