Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Virtual Reality or the New Reality of Virtual Practice? Image

Virtual Reality or the New Reality of Virtual Practice?

Mark Sangster

In response to the worst period on record for cyber attacks, the ABA published Formal Opinion 498 to address practicing law outside of the traditional brick-and-mortar office environment. It reminds lawyers that while the ABA Model Rules permit virtual practice, they provide minimum requirements and recommendations for virtual practice, particularly in the areas of competence, confidentiality and supervision.

Features

Strategy vs. Tactics: Two Sides of a Difficult Coin Image

Strategy vs. Tactics: Two Sides of a Difficult Coin

Emil Sayegh

With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.

Features

The Queen's Gambit: A Proactive Approach to Reducing Technology Vendors' Contracting Risk Image

The Queen's Gambit: A Proactive Approach to Reducing Technology Vendors' Contracting Risk

Abeer Abu Judeh

There are numerous "gameplays" to reduce risks when selecting and hiring a technology vendor. Whether you are able to accept a risk and to what extent are not always clear. Just know that, like in chess, your opening move to an IT deal can be your most powerful.

Features

Work from Home Could Lead to Higher Cyber Insurance Claims Image

Work from Home Could Lead to Higher Cyber Insurance Claims

Yakir Golan

A look at the main software and application categories that increased during remote work and the vast implications for user privacy, corporate cybersecurity and cyber insurance.

Features

Preserving Snaps: Understanding Retention Features of Messaging Apps Image

Preserving Snaps: Understanding Retention Features of Messaging Apps

Philip Favro

The recent Doe v. Purdue University case out of the Northern District of Indiana — in which the court sanctioned plaintiff for failing to preserve relevant images and videos from his Snapchat application — teaches that counsel must understand the retention and deletion features of Snapchat and other messaging apps and social media if they are to help their clients preserve relevant ESI.

Features

Call for Nominations: Legalweek Leaders in Tech Law Awards 2022 Image

Call for Nominations: Legalweek Leaders in Tech Law Awards 2022

Zach Warren

Legalweek and Law.com are seeking nominations from lawyers who have handled cutting edge matters at the intersection of the law and technology.

Features

The Pandemic Job Market: From Drought to Pandemonium Image

The Pandemic Job Market: From Drought to Pandemonium

Jared Coseglia

This article gives historical context to the events that brought us to the current climate and provides guidance on how employers and employees can successfully navigate the ensuing complexities of job searching and hiring in the post-pandemic pandemonium. Part One of a Two-Part Article

Features

The Future of Litigation Workflow: Reimagining Technology and Process in the Next Decade Image

The Future of Litigation Workflow: Reimagining Technology and Process in the Next Decade

Ari Kaplan

A cross-section of law firm leaders comment on the current state of litigation, remote training, building cohesive and collaborative multidisciplinary teams, leveraging technology to enhance litigation processes and outcomes, and looking at the practice of law in the next decade.

Features

SCOTUS Narrowly Interprets CFAA to Avoid Criminalizing 'Commonplace Computer Activity' Image

SCOTUS Narrowly Interprets CFAA to Avoid Criminalizing 'Commonplace Computer Activity'

Patricia Kim & Maren Messing

The Court held that only those who obtain information from particular areas of the computer which they are not authorized to access can be said to "exceed authorization," and the statute does not — as the government had argued — cover behavior where a person accesses information which he is authorized to access but does so for improper purposes.

Features

EDRM Asks for Public Comment on New Information Governance Model Image

EDRM Asks for Public Comment on New Information Governance Model

ssalkin

Adoption of the IGRM model could mean "improving dialogue about information governance, increasing the buy in from stakeholders, and expanding the awareness of the importance of information governance in the modern enterprise."

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES