Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Legal Tech: Duty to Preserve ESI of Hybrid-Driven Collaborative Tools Image

Legal Tech: Duty to Preserve ESI of Hybrid-Driven Collaborative Tools

Kimbrilee M. Weber & Julien M. Baumrin

With heightened ease of use and convenience comes a duty for businesses and organizations to employ best practices regarding their responsibilities in maintaining the electronically stored information (ESI) that these applications create.

Features

Avoid Making Tech Decisions In Crisis Mode Image

Avoid Making Tech Decisions In Crisis Mode

Tomas Suros

Some law firms are realizing that the hasty, though necessary, decisions made to facilitate remote work should be revisited or undone. Many of the tools implemented in an emergency are insufficient to withstand the increasing cybersecurity threats law firms are facing today. The good news, though, is that it's not too late to implement the right tech to protect your firm.

Features

Why Collaborate: The Future of Legal Services Is Human Image

Why Collaborate: The Future of Legal Services Is Human

Joey Seeber

It is no surprise that in this environment many lawyers are prioritizing qualitative factors, such as work-life balance and feeling appreciated and recognized at work, rather than compensation alone when choosing where to work. Why is it no surprise? Because many of their employers began valuing quality over quantity with their ALSPs years ago. And this shift might do even more for your organization.

Features

A Compliance Briefing for Privacy Officers on the New Canadian Consumer Privacy Protection Act Image

A Compliance Briefing for Privacy Officers on the New Canadian Consumer Privacy Protection Act

John Beardwood & Shan Arora

Part Two In a Series Part One of this series introduced the history of Canada's recently introduced Consumer Privacy Protection Act and reviewed the similarities with GDPR, such as data portability, the right not be forgotten, codes of practice, and a safe harbor provision. Part Two analyzes the new compliance requirement of valid consent.

Features

New Technologies Make for a Shifting Definition of 'Technical Competence' Image

New Technologies Make for a Shifting Definition of 'Technical Competence'

Tinamarie Feil

While new and/or improving technologies may be challenging, they likely also present new opportunities which can facilitate delivering the best services at the best cost. Some solutions can be handled directly by law firms — but others will require the courts to approve, and, perhaps, even change of procedures to get with the times.

Features

Franchisors and Franchisees Make for Easy Cyber Targets Image

Franchisors and Franchisees Make for Easy Cyber Targets

Marc Lieberstein & Raymond Aghaian

We are increasingly hearing about security breaches, data leaks and other kind of data theft in the franchise world. This is because frequently the franchise systems operate as a connected mass of franchisees all of whom collect, store and transmit a diverse array of consumer and personal data to the franchisor. In other words, franchisors and franchisee make a nice easy target for cyber theft.

Features

Jurisdictional License Requirements and Disparate Laws Are Hindering Law Firms' Fight Against Cybercrime Image

Jurisdictional License Requirements and Disparate Laws Are Hindering Law Firms' Fight Against Cybercrime

Isha Marathe

Some cybersecurity experts think the structure of law in the U.S. itself means that truly fighting against growing threat actors is a losing game. Take, for example, the fact that attorneys are largely limited by jurisdictional licensure requirements. While on the other hand, bad actors are often organized, unsaddled by jurisdictional challenges, and able to function as a large decentralized group.

Features

Will Other States Follow NY's Lead on Requiring Cybersecurity CLE? Image

Will Other States Follow NY's Lead on Requiring Cybersecurity CLE?

Cassandre Coyer

New York has become the first state to add a requirement mandating that lawyers take legal education courses in cybersecurity, privacy and data protection. As cyberthreats will likely continue to both grow and evolve in sophistication, attorneys expect this requirement to be only a first step, with more states likely to soon follow.

Features

Text Messages In E-Discovery Image

Text Messages In E-Discovery

David Horrigan

This article looks beyond conspiracy theories and Secret Service slip-ups — or subterfuge, depending on one's perspective — to take a look at the law and technology of texts in e-discovery.

Features

Data Rights, Data Duties, & Data Risks: The American Data Privacy and Protection Act Image

Data Rights, Data Duties, & Data Risks: The American Data Privacy and Protection Act

Rita W. Garry

While the ADPPA represents compromises between Democratic and Republican leadership of the U.S. Senate and House of Representatives, particularly around the thorny issues of state law preemption and private rights of action, there are other legislative and big tech industry players pushing their own agendas for comprehensive national data privacy and security frameworks.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • How the U.S.-China Trade War Effects IP Strategy
    The trade war between the United States and China has had far-reaching effects on international trade and the global economy. The dispute is slowly developing into a battle of attrition, without any immediate resolution on the horizon despite ongoing trade talks. As businesses change the way they operate in response to this unpredictable trade environment, counsel should consider the risks and potential impacts on corporate IP strategy.
    Read More ›
  • Legal Possession: What Does It Mean?
    Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
    Read More ›