Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Where Is the Consumer In Consumer Privacy Legislation? Image

Where Is the Consumer In Consumer Privacy Legislation?

Rita W. Garry

In the past four months of 2021, the amount of state legislative activity around consumer data privacy laws has been frantic, by state legislatures standards. So much so, it is not easy to discern the cause for all this effort.

Features

Attorney Competence in Technology Is in the Spotlight. Are You Competent? Image

Attorney Competence in Technology Is in the Spotlight. Are You Competent?

Tomas Suros

In response to widespread changes in the use of technology, and evaluating the potential risks of remote work and the rise of virtual meeting platforms, on March 10, 2021, the ABA Standing Committee on Ethics and Professional Responsibility issued Formal Opinion 498 making it clear that the Model Rules of Professional Conduct permit lawyers to conduct their practices virtually, but urges caution at all times:

Features

Closing the Information Security Gaps In the New Operational Model Image

Closing the Information Security Gaps In the New Operational Model

Kyle Reese & Nathan Curtis

In 2020, law firms did what they had to do to continue serving their clients. Information governance may have been sacrificed in the face of an urgent, global crisis. As understandable as that is, it's time now to step back and assess best practices for the new operational model that is here to stay.

Features

Mastery of Information: How to Successfully Manage Ungoverned Data for Risk Mitigation Image

Mastery of Information: How to Successfully Manage Ungoverned Data for Risk Mitigation

Peter Baumann

Companies are collecting and managing more data than ever, essentially in order to create value, thus in effect making every company a "data" company. But for data to provide value, organizations need to know where it is, who has access to it, how it's managed, including its longevity value, and how it needs to be secured and protected.

Features

Best Practices for Investigations In Remote Environments Image

Best Practices for Investigations In Remote Environments

Colin Jennings, David Meadows, Nicole Wells & John Winkler

With regulatory and investigations activity expected to pick up significantly in the coming year, it's more important than ever to tighten up remote investigations methods to meet best practices. Aside from enabling continuity during COVID-19 restrictions, remote workflows offer a number of benefits in investigations.

Features

Expectation of Privacy In Surveillance Cameras Image

Expectation of Privacy In Surveillance Cameras

Leonard Deutchman

Recently, the Pennsylvania Supreme Court held that audio interceptions did not violate the rights of the defendant under the Wiretap Act, and so were admissible. The Supreme Court drew a proper and logical conclusion from the facts and the law and, hopefully, brought us closer to a reasonable look at the issue, but we still have a long way to go.

Features

Legal Tech: EU E-discovery 'Phenomenon' Comes With Unique Issues Image

Legal Tech: EU E-discovery 'Phenomenon' Comes With Unique Issues

Frank Ready

For a jurisdiction with little to no discovery process, the EU and its stringent privacy requirements may have already emerged as the next frontier for e-discovery providers looking to expand their business outside of the United States. However, the region's relative inexperience with e-discovery could still emerge as a hindrance for vendors eyeing an EU-based expansion.

Features

Ramped Up Internal Technology Is a Win-Win for Law Firms and Their Clients Image

Ramped Up Internal Technology Is a Win-Win for Law Firms and Their Clients

Brandie Knox

This article identifies why investing in digital tools and applications is more important today than ever and provides examples and potential questions law firms should contemplate.

Features

How Should Directors Respond to the SolarWinds Attack Image

How Should Directors Respond to the SolarWinds Attack

Paul A. Ferrillo

This article is not about "who did what wrong" or "what nation-state commenced this attack." It's really more about is, "if I am a Director, what should I be thinking about the SolarWinds attack?"

Features

The Situation of Your Company's CISO and How It Impacts Data Security Image

The Situation of Your Company's CISO and How It Impacts Data Security

Kenya Parrish-Dixon

The intensity of information security briefings often leads to organizations tucking the CISO under the CIO instead. After all, all technology is related, right? This is a huge mistake, and it is wreaking havoc on American data security.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES