Features
Legal Tech: Summer 2020's Most Interesting E-Discovery Cases
Social Media & Cell Phones Still Represent an E-Discovery Battleground
Features
COVID-19 and Working Remotely: Embracing the Changes and the Challenges In a Pandemic
Experts share their experience and insight around workplace trends and the value of technology tools to drive productivity and engagement in a roundtable discussion.
Features
Cybersecurity for Remote Workers: Keeping Financial Information Secure
At the beginning of the COVID-19 pandemic, businesses scrambled to rapidly deploy a remote workforce which created new challenges for businesses to continue operating and providing critical services. It also created an opportunity for malicious actors to hack into and gain access to IT systems and sensitive, personal information.
Features
What's In a Name? Booking.com and Consumer Perception Evidence
In the first case in U.S. Supreme Court history argued by telephone, the Court on June 30, 2020 ruled 8-1 in favor of Booking.com holding that it could register as a trademark its eponymous domain name BOOKING.COM.
Features
Chief Legal Officers Taking Lead In Cybersecurity Policy, ACC Reports
In addition to helping make strategic business decisions, general counsel and chief legal officers are now often tasked with playing a leading part in a corporate cybersecurity and data privacy plan, according to the Association of Corporate Counsel's 2020 State of Cybersecurity Report.
Features
Legal Tech: Six Years of Tracking E-Discovery Trends and Providers
For the past six years, the E-Discovery Unfiltered report to identify pricing patterns and preferences in electronic discovery, highlight projected investments in the sector, gauge the impact of the cloud, track shifting preferences in outsourcing and remote review, understand vendor selection criteria, and focus on the need for international ediscovery, among other trends.
Features
Legal Tech: The Intersection of E-Discovery and Cybersecurity: You've Come a Long Way, Baby
Data is an asset and a liability. It fits into both accounting columns and will not fail to be used against a corporate entity if not secured properly. Databases contain trade secrets, personally identifiable information, HIPAA-protected health care information, proprietary information and classified data. As the size of databases grew and the importance of data became more evident, one thing became apparent: the information stored in those repositories had to be kept secure.
Features
Working Remotely? Here Are 4 Often-Overlooked Steps That Secure Your Data
By the time you read this, Americans will have been working from home for more than three months. This has never happened before in this country during the age of technology. As millions logged on to their home networks and personal devices in an attempt to keep their companies afloat, cybersecurity issues rose to the forefront of the many issues that companies had to manage.
Features
Synchronizing Legal Hold Requirements With Consumer Requests for Data Deletion
The biggest challenge with any legal hold process is ensuring that potentially relevant data is actually preserved. But with evolving requirements for how data is managed by new data privacy laws like the CCPA and the GDPR, it's become harder to secure data by simply sending a legal hold and assuming the custodian will do their duty to preserve it.
Features
Preparing for the LIBOR Phase Out: Contract Remediation Starts with Contract Intelligence
The London Interbank Offered Rate has long been the global basis for agreements that include a variable interest rate component. However, LIBOR would be replaced by other benchmarks by the end of 2021. Key to assessing risk of exposure, quantifying the financial impact, developing remediation plans and communicating material information to stakeholders will be the identification, analysis and remediation of LIBOR-based contracts.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- The Binding Effect of Plea Agreements In White Collar CrimesFederal plea agreements sometimes state explicitly that they are limited to that one office and do not bind other U.S. attorney's offices. In this article, we discuss the circuit courts' competing approaches to interpreting the binding effect of plea agreements and the Department of Justice policy.Read More ›
- Authentic Communications Today Increase Success for Value-Driven ClientsAs the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›