Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Virtual Reality or the New Reality of Virtual Practice? Image

Virtual Reality or the New Reality of Virtual Practice?

Mark Sangster

In response to the worst period on record for cyber attacks, the ABA published Formal Opinion 498 to address practicing law outside of the traditional brick-and-mortar office environment. It reminds lawyers that while the ABA Model Rules permit virtual practice, they provide minimum requirements and recommendations for virtual practice, particularly in the areas of competence, confidentiality and supervision.

Features

Strategy vs. Tactics: Two Sides of a Difficult Coin Image

Strategy vs. Tactics: Two Sides of a Difficult Coin

Emil Sayegh

With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.

Features

The Queen's Gambit: A Proactive Approach to Reducing Technology Vendors' Contracting Risk Image

The Queen's Gambit: A Proactive Approach to Reducing Technology Vendors' Contracting Risk

Abeer Abu Judeh

There are numerous "gameplays" to reduce risks when selecting and hiring a technology vendor. Whether you are able to accept a risk and to what extent are not always clear. Just know that, like in chess, your opening move to an IT deal can be your most powerful.

Features

Work from Home Could Lead to Higher Cyber Insurance Claims Image

Work from Home Could Lead to Higher Cyber Insurance Claims

Yakir Golan

A look at the main software and application categories that increased during remote work and the vast implications for user privacy, corporate cybersecurity and cyber insurance.

Features

Preserving Snaps: Understanding Retention Features of Messaging Apps Image

Preserving Snaps: Understanding Retention Features of Messaging Apps

Philip Favro

The recent Doe v. Purdue University case out of the Northern District of Indiana — in which the court sanctioned plaintiff for failing to preserve relevant images and videos from his Snapchat application — teaches that counsel must understand the retention and deletion features of Snapchat and other messaging apps and social media if they are to help their clients preserve relevant ESI.

Features

Call for Nominations: Legalweek Leaders in Tech Law Awards 2022 Image

Call for Nominations: Legalweek Leaders in Tech Law Awards 2022

Zach Warren

Legalweek and Law.com are seeking nominations from lawyers who have handled cutting edge matters at the intersection of the law and technology.

Features

The Pandemic Job Market: From Drought to Pandemonium Image

The Pandemic Job Market: From Drought to Pandemonium

Jared Coseglia

This article gives historical context to the events that brought us to the current climate and provides guidance on how employers and employees can successfully navigate the ensuing complexities of job searching and hiring in the post-pandemic pandemonium. Part One of a Two-Part Article

Features

The Future of Litigation Workflow: Reimagining Technology and Process in the Next Decade Image

The Future of Litigation Workflow: Reimagining Technology and Process in the Next Decade

Ari Kaplan

A cross-section of law firm leaders comment on the current state of litigation, remote training, building cohesive and collaborative multidisciplinary teams, leveraging technology to enhance litigation processes and outcomes, and looking at the practice of law in the next decade.

Features

SCOTUS Narrowly Interprets CFAA to Avoid Criminalizing 'Commonplace Computer Activity' Image

SCOTUS Narrowly Interprets CFAA to Avoid Criminalizing 'Commonplace Computer Activity'

Patricia Kim & Maren Messing

The Court held that only those who obtain information from particular areas of the computer which they are not authorized to access can be said to "exceed authorization," and the statute does not — as the government had argued — cover behavior where a person accesses information which he is authorized to access but does so for improper purposes.

Features

EDRM Asks for Public Comment on New Information Governance Model Image

EDRM Asks for Public Comment on New Information Governance Model

Steve Salkin

Adoption of the IGRM model could mean "improving dialogue about information governance, increasing the buy in from stakeholders, and expanding the awareness of the importance of information governance in the modern enterprise."

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • How the U.S.-China Trade War Effects IP Strategy
    The trade war between the United States and China has had far-reaching effects on international trade and the global economy. The dispute is slowly developing into a battle of attrition, without any immediate resolution on the horizon despite ongoing trade talks. As businesses change the way they operate in response to this unpredictable trade environment, counsel should consider the risks and potential impacts on corporate IP strategy.
    Read More ›
  • Legal Possession: What Does It Mean?
    Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
    Read More ›