Features

Top Signs Your Firm Is In Need of Legal Analytics
As technology continues to advance, integrating legal analytics into the practice becomes not just a choice but a necessity for staying competitive and providing top-notch legal services in the modern legal landscape.
Features

DOJ Calls On Companies to Incorporate Data Analytics In Anti-Corruption Compliance Programs
This article explains the DOJ's recent emphasis on robust data analytics in anti-corruption compliance programs, outlines how data analytics can and should be used in these programs, and suggests an approach to help legal counsel and companies determine if corporate programs will pass muster with the DOJ.
Features

AI and Law Practice: A Roadmap for Success In Modern Legal Firms
This article lays out a general roadmap for success in modern legal firms through the strategic incorporation of AI technologies.
Features

Cryptocurrency Risk Is Not So Hidden
Cryptocurrency exchanges and law together are an evolving space. As regulation of cryptocurrency advances, and case law and practice develops, more certainty around who holds what in a cryptocurrency exchange failure will develop. In the meantime, knowing the risks, and mitigating the risks where possible, is the prudent course of action for the cryptocurrency investor and trader.
Features

Canada Leads In Crypto Regulations
FTX's collapse pushed Canada's already robust cryptocurrency regulations further, offering protection to consumers and stability for compliant platforms but resulting in some major global platforms quitting the country because they weren't willing to comply.
Features

National Cybersecurity Strategy: Potential Impacts to Consider
What are the impacts to civil society and government if the plan works? We should consider that "collecting intelligence, imposing economic costs, enforcing the law, and, conducting disruptive actions" will work by some measure, and if so, the impacts to the cybersecurity ecosystem could be profound.
Features

How Law Firms Can Avoid A Summer of Cyberattack Threats
Summer at law firms creates an attack surface of which hackers love to take advantage. Legal and support staff rotate through vacations and time off, new crops of interns unfamiliar with tech processes enter the fold, and the remaining employees are often burned out and too distracted to notice the critical signs of an impending cyberattack.
Features

One Overlooked Element of Executive Safety: Data Privacy
Executives have access to some of the company's most sensitive information, and they're increasingly being targeted by hackers looking to steal company secrets or to perpetrate cybercrimes.
Features

How Modern Law Firms Are Navigating Digital Transformation
A new report emphasizes the connection between legal technology and law firm success, the importance of training to ensure technology adoption, the influence of automation and document management on digital transformation, and how law firms are deploying data to create a competitive advantage.
Features

Potential Legal Pitfalls for Public Companies Due to SEC's New Cybersecurity Rules
Some 16 months after first proposing rules for public companies and investment advisors, the SEC adopted new rules, chief among them that public companies disclose material cybersecurity breaches to investors within four days.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- Risks of “Baseball Arbitration” in Resolving Real Estate Disputes“Baseball arbitration” refers to the process used in Major League Baseball in which if an eligible player's representative and the club ownership cannot reach a compensation agreement through negotiation, each party enters a final submission and during a formal hearing each side — player and management — presents its case and then the designated panel of arbitrators chooses one of the salary bids with no other result being allowed. This method has become increasingly popular even beyond the sport of baseball.Read More ›
- Private Equity Valuation: A Significant DecisionInsiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity LitigationWhile the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.Read More ›