Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Redefining Attorney-Client Collaboration with Technology That Delivers Greater Value Image

Redefining Attorney-Client Collaboration with Technology That Delivers Greater Value

David Carns

If savvy law firm attorneys haven't done so yet, they should take this time to adjust their expectations and increase their comfort levels with new technologies, processes, and workflows. Going forward, their clients will expect the emphasis to be on relationships and outcomes, not billable hours.

Features

Cloud-Based Discovery Is at Critical Mass: Here's Why Image

Cloud-Based Discovery Is at Critical Mass: Here's Why

Kenneth Spencer

Part One of a Two-Part Series The legal industry today is experiencing a massive uptick in cloud-based discovery. The shift to remote and hybrid work and changing attitudes toward the cloud are significant factors in the movement to widespread adoption of cloud-based discovery. This article explains the momentum behind the rise of cloud-based discovery and the business reasons why companies will have to embrace it.

Features

The Changing Face of Incident Response Image

The Changing Face of Incident Response

Larry Gagnon

A good incident response program helps firms affected by a cyberattack identify potential damage to their reputation, their regulatory obligations for reporting and issuing notifications, and the potential for future litigation.

Features

Cyber Insurance Experiencing Future Shock Image

Cyber Insurance Experiencing Future Shock

Barry M. Miller & Elisabeth Gentile

Insurers who write cyber liability policies are well-equipped to manage cyber claims, but what about carriers and adjusters who face such claims under more traditional policies — also known as "Silent Cyber?" This article aims to help non-cyber risk adjusters who may have to oversee such a claim.

Features

7 Keys to Managing Tech and Service Company Partnerships Image

7 Keys to Managing Tech and Service Company Partnerships

David Cochran

Partnerships play a key role in today's legal marketplace. Typically, one supplier partners with a law firm and/or corporate legal department to provide…

Features

California 'Right to Know Act' Sets Off Alarm Bells Ring for Privacy Experts Image

California 'Right to Know Act' Sets Off Alarm Bells Ring for Privacy Experts

Isha Marathe

While state data privacy legislation is picking up across the U.S., a California bill that recently passed the State Senate and has remained largely under the radar, has some privacy experts raising alarm bells.

Features

Legal Tech: Can Claiming Incompetence Save You from Spoliation Sanctions? Image

Legal Tech: Can Claiming Incompetence Save You from Spoliation Sanctions?

Eric P. Mandel

A recent opinion in Illinois raises the question of whether spoliating parties should be encouraged to present the following defense at trial: "Ladies and gentlemen of the jury, yes the main evidence of this case has been destroyed, but it's only because my client and my law firm are completely incompetent when it comes to preserving electronic evidence."

Features

Enforcement Update: U.S. Courts Demonstrate Reluctance to Extend Application of Chinese Data Security and Privacy Laws In Civil Discovery Image

Enforcement Update: U.S. Courts Demonstrate Reluctance to Extend Application of Chinese Data Security and Privacy Laws In Civil Discovery

Jeff Pade & Lindsey Dieselman

Two recent Chinese laws — the Data Security Law (DSL) and the Personal Information Protection Law (PIPL) — include provisions aimed at restricting the cross-border transfer of China-based data foreign enforcement and judicial authorities. U.S. courts have not yet addressed whether these data protection and privacy laws could bar the production of documents in civil contexts involving governmental litigants or in criminal proceedings.

Features

Mitigating Risks at Professional Service Firms Using Artificial Intelligence Image

Mitigating Risks at Professional Service Firms Using Artificial Intelligence

Brian P. Piatek

Truly malicious internal threats can often be treated much like external threats using the tools and backups already in place. But how does a firm proactively identify the softer threats — which may be just as dangerous as the malicious threats and can cripple a firm just as effectively?

Features

The Anatomy of a Supply Chain Cyberattack Image

The Anatomy of a Supply Chain Cyberattack

Brian Schmitt & Abeer Abu Judeh

Mitigating Its Risks and the Call for Standardization of Software Development Security Protocols This article details the anatomy of a supply chain cyberattack, explores the existing state of supply chain protective contractual terms, and proposes actionable steps with a collective approach to guide legal professionals through their precarious endeavors.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Unlicensed Real Estate Broker in New York: Beware
    The U.S. District Court for the Northern District of New York recently determined that because New York prohibits unlicensed real estate brokers from pursuing payment in its courts for services rendered, a plaintiff who performed real estate work for a client who then did not pay had no standing to sue.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • How the U.S.-China Trade War Effects IP Strategy
    The trade war between the United States and China has had far-reaching effects on international trade and the global economy. The dispute is slowly developing into a battle of attrition, without any immediate resolution on the horizon despite ongoing trade talks. As businesses change the way they operate in response to this unpredictable trade environment, counsel should consider the risks and potential impacts on corporate IP strategy.
    Read More ›