Features
Chief District Judges Now Require Sealed Documents Outside of E-Filing System As Safeguard
U.S. chief district judges in multiple jurisdictions, including the Southern District of New York and Eastern District of Virginia, now require parties to serve opposing counsel with sealed documents outside of the federal judiciary’s electronic filing system following recent cyberattacks on the judiciary’s virtual assets.
Features
Report: Corporate Law Departments Aren’t Tracking AI Performance
While many corporate legal departments have been able to track their spending, few are tracking their outcome-based performance metrics, according to a report from Everlaw and the Association of Corporate Counsel (ACC).
Features
Use a WISP As a Roadmap to Detail Data Security Processes and Controls
The written information security plan (WISP) is not just another compliance document, it's a practical roadmap that turns abstract data protection duties into concrete business practices.
Features
From Reactive to Proactive: Navigating AI, Privacy and Security Compliance Across APAC’s Expanding Regulatory Landscape - Part Two
APAC is awash with recent changes in AI, privacy and cybersecurity regulations. Part one of this article examined the specifics of those changes and the paradigm shift they are precipitating. Part two explores the real-world implications of those changes and key takeaways for compliance teams.
Features
The Investigative Complexities of the TAKE IT DOWN Act
The increasing prevalence of cyberstalking, harmful deepfakes and online harassment is creating profound risks for individuals and organizations. So much so that Congress has implemented a federal statute designed to shift liability toward online platforms and provide victims with enforceable removal rights.
Features
Five Operational Foundations To Determine Whether Your Tech Investments Will Succeed In 2026
Law firms are spending record amounts on technology right now. The difference between technology investments that succeed and those that fail may have less to do with the tools themselves than the operational foundation beneath them.
Features
Use a WISP to Detail Data Security Processes and Controls
The written information security plan (WISP) is not just another compliance document, it's a practical roadmap that turns abstract data protection duties into concrete business practices.
Features
AWS Outage Demonstrates Risks of Cloud Services
The recent Amazon Web Services outage, which incapacitated online services across the country, highlights risks companies must manage as they increasingly depend on cloud services, lawyers say.
Features
Trends In Patent Policy and Enforcement: What Cybersecurity Companies Need to Know
Forward-thinking cybersecurity companies should recognize that the patent world is at a moment of change. A tremendous amount of thought, financial investment, and political capital is being devoted to transforming patents into assets that are central to the economy, international trade, and national defense. The incentives for obtaining and aggressively monetizing patents are increasing. Companies that take steps now to navigate these changes may be rewarded with significant competitive advantages.
Features
Pioneering AI In Law Firm Cybersecurity: Balancing Innovation With Risk of Using GANs and Other Novel Solutions
The cybersecurity arms race shows no signs of slowing. Attackers continue developing more sophisticated techniques, forcing defenders to evolve accordingly. Generative adversarial networks (GANs) represent one of the most promising developments in the defensive arsenal, but only when deployed wisely. Organizations should evaluate their risk appetite and technical capabilities carefully.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Law Firm Real Estate Strategy: Attorney Offices Are Out, Conference Rooms Are InLaw firms are navigating a paradigm shift in how they approach office space. With the rise of flexible workplaces, firms are finding that when their attorneys do come into the office, the main goal is to connect and collaborate with peers — and this shift has transformed how law firms address their real estate needs.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The Perfect Storm: Why Contract Hiring Will Eclipse Direct Hiring In Privacy and Tech In 2024Part Two of a Two Part Article Part 1 of this article looked at how remote flexibility is driving job seekers, that most privacy programs will use contractors by 2026, the speed of hire, the real cost of DIY staffing and whether posting jobs online really works. Part 2 looks at what's next for CPOs, AI jobs in privacy, where the new jobs will come from, whose salaries are spiking and some guidance for the latter half of 2024.Read More ›
