Features
It's Legalweek Time Again
This year, Legalweek will feature workshop boot camps, networking events, hundreds of exhibitors on the tradeshow floor and three conferences designed to address key issues at a functional level: LegalCIO, Legal Business Strategy, and, of course, Legaltech, the world's largest and longest running trade show for legal technology.
Features
Legal Tech: Babst Calland & Solvaire: An AI Contract Review Use Case
In today's business climate, clients demand greater efficiency when it comes to contract review for many complex deals and transactions. We have found that the combination of deep legal expertise, coupled with embracing carefully researched and vetted technology, is the most effective means of delivering high quality and timely review in an increasingly competitive marketplace.
Features
Digital Dive: New Report Reveals Opportunities for Improvement on Digital Marketing Strategy for Law Firms
For those of us who have devoted more years in legal marketing than we'd care to admit, it's heartening to see the field receiving the recognition it deserves. The demand for top talent has never been higher and marketing plans are getting more attention from firm management. Still, there is more work for law firms to do. That's particularly true in digital marketing.
Features
Supreme Court, Finally, Takes Up Google v. Oracle
The U.S. Supreme Court has jumped into a titanic copyright battle between Oracle Corp. and Google LLC with both barrels. The court's involvement is sure to reignite a 50-year-old debate over how much, if any, software should be subject to copyright, and the contours of the fair use defense in the digital age.
Features
Effectively Managing Increasing Client Security Requirements
Gone are the days of naively assuming our confidential data is secure. Increasingly, clients, stakeholders, regulators and others are demanding proof that firms are actively protecting the PII to which they have access, and this evidence is being demanded both before and after security incidents. It is imperative law firms have the positions and processes in place to handle security incidents with urgency, accuracy and completeness.
Features
Law Firms Enter the Golden Age of Data Mining
As a matter of practice, law firms generate and store incomprehensible amounts of data. Most, if not all, of that data has been digitized and many firms that recognize the untapped value of their data have begun to leverage sophisticated technologies to mine it for reusable work product and valuable insights.
Features
Can Artificial Intelligence Fix Security Issues?
There is great enthusiasm about what AI can do to promote better living conditions, evoking wisdom, providing business intelligence through deep analysis of behavior and habits, by signaling trends and anticipating demand. But there are other considerations as well. A critical one is cybersecurity.
Features
How the Healthcare Industry Can Fight Rising Cyber-Attacks
The healthcare industry is facing an alarming proliferation of cyber perils. Why? Because our healthcare system is a "soft target," and particularly vulnerable because of its lifesaving work, where time is of the essence. It's a recipe for disaster from a cybersecurity standpoint.
Features
Cybersecurity Experts Needed in U.S.
The Country Is In Dire Need of Experts Who Possess the Advanced Knowledge, Skills and Experience Required to Combat Cybersecurity Crimes In an effort to protect our financial, personal, medical, and otherwise confidential data, as well as our election systems, we need to continue to attract and employ the services of the most qualified cybersecurity experts from around the world. However, at present, there is a dire shortage of such qualified experts in the United States.
Features
Unique Cyber Risks Faced By the Cannabis Industry
All companies face cybersecurity threats, but the legalized cannabis industry's storage of personally identifiable information and reliance on seed-to-sale tracking software can place it firmly within hackers' crosshairs.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- The Binding Effect of Plea Agreements In White Collar CrimesFederal plea agreements sometimes state explicitly that they are limited to that one office and do not bind other U.S. attorney's offices. In this article, we discuss the circuit courts' competing approaches to interpreting the binding effect of plea agreements and the Department of Justice policy.Read More ›
- Authentic Communications Today Increase Success for Value-Driven ClientsAs the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›