Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


Get a (Law) Firm Grip on Data Breaches
June 02, 2015
Law firms are as much at risk for cyber attacks as any other industry. Because of the lack of reporting requirements in the industry, it is unclear how many breaches have actually occurred. This article describes some of the reasons law firms are cyber-attack targets, steps they can take to reduce their risk, and what clients are doing to encourage law firms in those efforts.
Get a (Law) Firm Grip on Data Breaches
June 02, 2015
Law firms are as much at risk for cyber attacks as any other industry. Because of the lack of reporting requirements in the industry, it is unclear how many breaches have actually occurred. Fortunately, law firms are now recognizing the risk and beginning to take preventive action. This article describes some of the reasons law firms are cyber-attack targets, steps they can take to reduce their risk, and what clients are doing to encourage law firms in those efforts.
Cybersecurity Lawyers Getting Plenty of Company
June 02, 2015
High-profile data breaches in the past few years have been a wakeup call for corporate America ' and made cybersecurity and data privacy the next "it" practice for lawyers. There's been a gold rush to the field, practitioners say ' and the potential rewards have attracted some Johnny-come-latelies and pushed attorneys to seek out new ways of distinguishing themselves as experts.
Your Best Precedent Is Unpublished: Now What?
June 02, 2015
Imagine counsel representing litigants before a court. An attorney for one party takes a position on the issue. The court responds that, in a previously filed pleading, counsel had taken the opposite position on behalf of his or her client. The attorney responds, "No, Your Honor, that was an 'unpublished' filing. Not only am I not bound by it, in this jurisdiction, you are not even permitted to bring that unpublished filing to my attention."
Leading Succession
June 02, 2015
The majority of law firms faced with generational change do not survive into the next generation after the founders retire. This risk of decline or dissolution can be greatly mitigated if your firm plans ahead of time for succession.
Avoid Drowning in Data
June 02, 2015
Data is a rich source for evidence in litigation and, for many companies, a valuable asset. What is less apparent, however, is exactly how to properly manage information and its privacy and security. However, over the past several decades, best practices have been developed for establishing and managing a comprehensive privacy, data protection and information governance program. This article summarizes those learnings to suggest an approach for how to design and run a program that is right for your company.
Insights into the Legal Marketing Association
June 02, 2015
Interested to learn what inspired Adam Severson to become president of the legal marketing global professional association of Legal Marketing Association, the author recently posed a series of questions in order to gain his thoughtful insights. Below are Adam's responses:
Broad Duty to Defend in IL
June 02, 2015
A recent ruling from an Illinois intermediate appellate court confirms that an insurer's duty to defend under Illinois law is broad, extending even to cases where it is clear from the record that a policyholder is unlikely to be found liable in the underlying lawsuit.
Spotting Unreliable Child Interviews
June 02, 2015
Unfortunately, not all child interviews are created equal, and a biased or unskilled evaluator can shape or distort a child's recollection of family history.
<b><i>At the Intersection:</i></b> Scope-Blindness: Confusing Trees with Forests
June 02, 2015
As one of its core principles, Legal Project Management (LPM) emphasizes the need for effective project scoping as a crucial first step for delivering legal services efficiently, predictably, on time and on budget. Most experienced lawyers tell us they scope engagements quite well. In our experience, many of them don't.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›