Features
What Is Your Dashboard Report Telling You? Chances Are, Not Much.
Firms are struggling to capture compelling business intelligence about themselves. Until recently, most operated with a cadre of legacy operating systems, financial platforms and reporting technologies from different manufacturers that have no mechanism for connecting with each other. The disparate nature of these technologies has exacerbated the struggle to leverage data and display results in a reporting mechanism that helps direct the firm's decision-making.
Features
Marriott Moves to Dismiss Data Breach Lawsuit, Says Passport Numbers Useless to Hackers
In Its Motion To Dismiss, Marriott Insisted the Breach Caused No Harm to Its Guests and Attached a Declaration By a Former Government Official Who Wrote: "A U.S. Passport Is Virtually Impossible to Forge Successfully." Marriott is insisting that last year's cyberattack did no harm to its hotel guests, not least of which because hackers cannot use stolen passport numbers.
Features
Legal Tech: New Cases Provide Insights on the FRCP 37(e) 'Reasonable Steps to Preserve' Requirement
The Franklin and Culhane Cases Demonstrate the Importance of Both Implementing and Then Following Corporate Litigation Readiness Measures for Purposes of FRCP 37(E) An evaluation of FRCP 37(e) necessarily entails examining key motion practice flash points that have arisen since the implementation of the rule. One of the most significant of these flash points is what constitutes "reasonable steps to preserve" relevant ESI.
Features
Legal Tech: Demystifying Social Media Discovery
Social Media Escapes an Easy Definition, But You Know It When You See It While it would be helpful to understand the technical details of collecting data from various social media platforms, what's more important is what parts of social media might be relevant to a dispute and what that means for both the requesting and producing parties.
Features
Cybersecurity In the Legal Space: Is Your Organization Prepared?
Organizations that continue to be complacent about data security ignore the considerable risks posed by a breach: extended downtime, loss of billable hours, destruction or loss of sensitive data and work product, and the potentially catastrophic costs associated with repairing the damage — both to their technology infrastructure and to their reputation and brand.
Features
GDPR & CCPA Are Just the Beginning
How Middle Market Companies Can Shore Up Their Data Privacy The most significant overhaul to the EU's data privacy policies in over 20 years, with extraterritorial reach, forced American businesses to remediate, and in some cases, overhaul their data privacy governance programs. But the GPDR was just the beginning. Organizations seeking compliance with the growing number of data privacy regulations will need to remain vigilant, especially for organizations that rely heavily on personal data.
Features
The State of the U.S. Privacy Job Market, 2019: Part Two
A Reflection on the Year Behind, the Years Ahead, and Why Privacy Means So Much to Us Part Two of a Two-Part Article Part two of The State of the U.S. Privacy Job Market, 2019 will outline what is happening within service providers, consultancies, and vendors will touch briefly on government agencies and will predict the near-future state of the U.S. privacy job market.
Features
Legal Tech: Summer 2019 E-Discovery Case Law Review
A review of recent cases involving e-discovery.
Features
Legal Tech: Litigation Support, E-discovery and the Recovery of Costs
The Data Explosion vs. Recovery Model Stagnation For law firms, the pace of exponential growth of data is a substantial problem — mainly due to the fact that the law firm business model of processing, hosting and storing this avalanche of client data, however, has not evolved as quickly as the data itself.
Features
Legal Tech: What GCs Want from Legal Technology
Legal Tech Companies Have to Get Out of Their Own Way In Vying for Law Department Adoption The legal technology industry has some significant hurdles to overcome in its increased push to sell into legal departments, general counsel say, admitting they themselves are part of the problem.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?What Law Firms Need to Know Before Trusting AI Systems with Confidential Information In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- The Binding Effect of Plea Agreements In White Collar CrimesFederal plea agreements sometimes state explicitly that they are limited to that one office and do not bind other U.S. attorney's offices. In this article, we discuss the circuit courts' competing approaches to interpreting the binding effect of plea agreements and the Department of Justice policy.Read More ›
- Authentic Communications Today Increase Success for Value-Driven ClientsAs the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›