Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Columns & Departments

Live Webinar: The Crypto Landscape Post-FTX Image

Live Webinar: The Crypto Landscape Post-FTX

CLS Staff

On Feb. 15 at 4 p.m. ET, Cybersecurity Law & Strategy will present a complimentary live webinar titled "The Crypto Landscape Post-FTX." The presentation will cover the current status and near-future outlook for the blockchain (crypto) sector.

Features

Typically Uncommon: Defending Class Action Certification in Data Breach Litigation Image

Typically Uncommon: Defending Class Action Certification in Data Breach Litigation

Brian E. Middlebrook, Tyrik Jiang, John T. Mills & Joseph Salvo

The most common questions and key elements of a negligence claim are whether the defendant breached a duty of care, whether there is any injury as a result of the defendant's breach of any purported duty of care, and whether the defendant's alleged breach caused the plaintiff any damages. While these essential questions and elements apply with equal force in data breach litigation, the difficult question to answer in these cases is "what is the value, if any, of your injury or damages?"

Features

A Legal CIO's Guide to Technology Procurement In 2023 Image

A Legal CIO's Guide to Technology Procurement In 2023

Ted Theodoropoulos

For a legal CIO, one of the key responsibilities is to establish that the organization has the right technology in place to support its operations and achieve its business goals. This can be challenging, as there are many factors to consider when choosing new technology for your organization. One bad decision can have a material impact on not only the bottom line, but on the ability of your firm to compete in an ever-changing legal market.

Features

Best Practices In Second Request Document Review: Eliminating the Fear Factor Image

Best Practices In Second Request Document Review: Eliminating the Fear Factor

Jessica Robinson & Amit Dungarani

Part One of a Two-Part Article: Challenges and solutions in document review HSR second requests have become increasingly common in mergers or acquisitions that meet the premerger reporting threshold, which in 2022 was a transaction value of more than $101 million. The burdens of complying with second requests are onerous. The mere thought of undergoing such an exercise tends to strike fear in the heart of the legal department. In this article series, we'll outline the major challenges of second requests, suggest strategies to overcome them, and discuss how to face a second request with equanimity and confidence.

Features

Innovating Hybrid: Empathy and Iteration Image

Innovating Hybrid: Empathy and Iteration

Alaa Pasha

Recognizing that this is a time of innovation, one way law firms can 'prepare for a future we can't yet see' is through leveraging two key levers: the need for empathy and iteration.

Features

What's In Store for the Blockchain Industry In 2023? Image

What's In Store for the Blockchain Industry In 2023?

Chris Sloan & Justin Daniels

The FTX bankruptcy caps a very difficult 2022 for the entire blockchain industry, spanning exchanges to decentralized finance to non-fungible tokens (NFTs). Blockchain and crypto skeptics are shouting "I told you so," while investors watch billions of investment dollars evaporate under the harsh light of the bankruptcies of Celsius, Compute North and now FTX.

Features

Is Asking E-Discovery Vendors for Indemnification for Data Breaches Provide Security of Clients' Data? Image

Is Asking E-Discovery Vendors for Indemnification for Data Breaches Provide Security of Clients' Data?

Cassandre Coyer

Threats of cyberattacks have not only made legal professionals more wary — especially as legal teams in firms and in-house are increasingly the target of cyber hackers — but it has also changed their relationship with vendors.

Features

Privilege Logs: Strategy, Best Practices and Practical Advice Image

Privilege Logs: Strategy, Best Practices and Practical Advice

Bansri McCarthy, Leonard Impagliazzo & Tara Lawler

This article provides an overview of the different types of privilege logs, lays out best practices for negotiating ESI or privilege-log protocols, and discusses other issues that can occur with privilege logs in e-discovery.

Features

Data Minimization Meets Defensible Disposition: Just Say No to ROT and Over-Retention of Personal Information Image

Data Minimization Meets Defensible Disposition: Just Say No to ROT and Over-Retention of Personal Information

Martin Tully & Nick Snavely

Like a good diet and regular exercise for the body, data minimization and routine, defensible purging of outmoded documents are essential to maintaining healthy organizational information hygiene.

Features

Leaning on Trusted Partners to Drive Legal Tech Adoption and Avoid Failed Implementation Image

Leaning on Trusted Partners to Drive Legal Tech Adoption and Avoid Failed Implementation

Mark Wilcox

Turning to familiar, trusted partners to help navigate the unruly waters of change management, adoption and an ocean of new legal technology options.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • How the U.S.-China Trade War Effects IP Strategy
    The trade war between the United States and China has had far-reaching effects on international trade and the global economy. The dispute is slowly developing into a battle of attrition, without any immediate resolution on the horizon despite ongoing trade talks. As businesses change the way they operate in response to this unpredictable trade environment, counsel should consider the risks and potential impacts on corporate IP strategy.
    Read More ›
  • Legal Possession: What Does It Mean?
    Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
    Read More ›