Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Cybersecurity and Legal Tech In 2022: Predictions from the Field: Part Two Image

Cybersecurity and Legal Tech In 2022: Predictions from the Field: Part Two

Zach Warren & Steve Salkin

Predictions from experts continue, with a look at what 2022 might hold in next generation technology, legal operations and contract review.

Features

The Top 10 2022 Job Market Predictions in Legal Technology Image

The Top 10 2022 Job Market Predictions in Legal Technology

Jared Coseglia

In 2022 hiring will remain the top obstacle to business fulfillment across the e-discovery, data privacy, and cybersecurity landscapes. Here's how to stay a cut above the competition — whether you are an employer or a job seeker.

Features

Landscape of Standalone Cybersecurity Policies Has Changed Due to Increased Risk and Scrutiny Image

Landscape of Standalone Cybersecurity Policies Has Changed Due to Increased Risk and Scrutiny

Walter Andrews, Andrea DeField & Sima Kazmir

Because the market is rapidly changing, policyholders should not expect that they'll be offered the same coverage at renewal. Policyholders should start their renewal process earlier going into this year's renewal so they have time to analyze new pricing, as well as new endorsements that may limit coverage and consider alternative forms, insurers, and policies to maximize coverage.

Features

Inside Cryptocurrency Pump-and-Dump Schemes Image

Inside Cryptocurrency Pump-and-Dump Schemes

Jonathan Bick

Since the inception of cryptocurrency as a widely traded asset, there has been increasing opportunity to make money through market manipulation, specifically through classic pump-and-dump and related fraudulent schemes, and more specifically CPDs.

Features

Legal Tech: Effective Preservation Measures In Litigation Readiness Image

Legal Tech: Effective Preservation Measures In Litigation Readiness

Philip Favro

Basic ESI preservation steps, including litigation holds, relevant source checklists, and follow up steps with custodians may not be enough in some instances. Given the frequency of data loss from custodial and non-custodial sources, companies should also consider incorporating remediation strategies into their approach to preservation to better ensure defensibility.

Features

More than Just a Purchase, a Partnership: Tips for Success with Cloud-based Practice Management In 2022 Image

More than Just a Purchase, a Partnership: Tips for Success with Cloud-based Practice Management In 2022

Tomas Suros

While functionality and features are important, there are a number of additional considerations when evaluating a practice management solution. Will your platform provider serve as a partner that will offer expert guidance and be invested in your ongoing success?

Features

Predicting What 2022 Holds for Cybersecurity Image

Predicting What 2022 Holds for Cybersecurity

Emil Sayegh

Predictions aside, complacency is not an option if you plan to survive and thrive in 2022. Rest assured, the future of cybersecurity is bright, but it will come with its own set of challenges. We look forward into the future because the sooner we can start adapting strategy, policies, and technologies, the better off everyone will be in the long run.

Features

Biometric Privacy: A Year In Review (2021) and The Year Ahead (2022) Image

Biometric Privacy: A Year In Review (2021) and The Year Ahead (2022)

Lauren Caisman and Christian Auty

The year started with Portland, Oregon's ban on the use of facial recognition technology by private entities in places of "public" accommodation. It concluded with the rendering of important appellate decisions on the Illinois Biometric Information Privacy Act. In the middle, was the continued flurry of litigation, class action settlements, and legislative activity.

Features

Cybersecurity and Legal Tech In 2022: Predictions from the Field Image

Cybersecurity and Legal Tech In 2022: Predictions from the Field

Zach Warren

It's still a dangerous cyber world as we enter 2022, but one that today's attorneys and legal technologists are prepared to tackle. Here's what they predict for cybersecurity, remote work, privacy and e-discovery in the new year.

Features

Cybersecurity and Corporate Privacy Enforcement Is Focus of Feds Image

Cybersecurity and Corporate Privacy Enforcement Is Focus of Feds

David Saunders & Julian L. André

It started as a hushed rumor in the beltway, then became a known fact by those going to join the administration. And now we all know: The Biden administration has brought with it a renewed focus on data privacy and cybersecurity.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Unlicensed Real Estate Broker in New York: Beware
    The U.S. District Court for the Northern District of New York recently determined that because New York prohibits unlicensed real estate brokers from pursuing payment in its courts for services rendered, a plaintiff who performed real estate work for a client who then did not pay had no standing to sue.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • How the U.S.-China Trade War Effects IP Strategy
    The trade war between the United States and China has had far-reaching effects on international trade and the global economy. The dispute is slowly developing into a battle of attrition, without any immediate resolution on the horizon despite ongoing trade talks. As businesses change the way they operate in response to this unpredictable trade environment, counsel should consider the risks and potential impacts on corporate IP strategy.
    Read More ›