Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Cybersecurity Law & Strategy

Features

"Shadow AI": The Hidden AI Already In Your Law Firm Image

"Shadow AI": The Hidden AI Already In Your Law Firm

Robert Padilla

“Shadow AI” highlights a growing risk for firms that have yet to develop comprehensive governance strategies for artificial intelligence. In today’s rapidly evolving digital landscape, the question is not whether AI is present in your organization, but whether it is being managed responsibly.

Features

The Investigative Complexities of the TAKE IT DOWN Act Image

The Investigative Complexities of the TAKE IT DOWN Act

Johnathan Bridbord

The increasing prevalence of cyberstalking, harmful deepfakes and online harassment is creating profound risks for individuals and organizations. So much so that Congress has implemented a federal statute designed to shift liability toward online platforms and provide victims with enforceable removal rights.

Features

Five Operational Foundations To Determine Whether Your Tech Investments Will Succeed In 2026 Image

Five Operational Foundations To Determine Whether Your Tech Investments Will Succeed In 2026

Rick A. Campbell

Law firms are spending record amounts on technology right now. The difference between technology investments that succeed and those that fail may have less to do with the tools themselves than the operational foundation beneath them.

Features

From Reactive to Proactive: Navigating AI, Privacy and Security Compliance Across APAC’s Expanding Regulatory Landscape - Part Two Image

From Reactive to Proactive: Navigating AI, Privacy and Security Compliance Across APAC’s Expanding Regulatory Landscape - Part Two

Brandon Hollinder & Jon Kessler

APAC is awash with recent changes in AI, privacy and cybersecurity regulations. Part one of this article examined the specifics of those changes and the paradigm shift they are precipitating. Part two explores the real-world implications of those changes and key takeaways for compliance teams.

Features

Use a WISP As a Roadmap to Detail Data Security Processes and Controls Image

Use a WISP As a Roadmap to Detail Data Security Processes and Controls

Alfred R. Brunetti

The written information security plan (WISP) is not just another compliance document, it's a practical roadmap that turns abstract data protection duties into concrete business practices.

Features

Report: Corporate Law Departments Aren’t Tracking AI Performance Image

Report: Corporate Law Departments Aren’t Tracking AI Performance

Ella Sherman

While many corporate legal departments have been able to track their spending, few are tracking their outcome-based performance metrics, according to a report from Everlaw and the Association of Corporate Counsel (ACC).

Features

Chief District Judges Now Require Sealed Documents Outside of E-Filing System As Safeguard Image

Chief District Judges Now Require Sealed Documents Outside of E-Filing System As Safeguard

Sulaiman Abdur-Rahman

U.S. chief district judges in multiple jurisdictions, including the Southern District of New York and Eastern District of Virginia, now require parties to serve opposing counsel with sealed documents outside of the federal judiciary’s electronic filing system following recent cyberattacks on the judiciary’s virtual assets.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES