Features

The Meaning of the 'War Exclusion Clauses' In Cyberinsurance
The Eastern European conflict is already adding stress to already strained domestic relationships in the U.S. — between businesses and cyber insurance companies. As businesses face more cyberthreats than ever before, many are seeing higher premiums. Meanwhile, insurance companies are looking for ways to skirt coverage obligations that end up proving far too expensive
Features

Legal Tech: Duty to Preserve ESI of Hybrid-Driven Collaborative Tools
With heightened ease of use and convenience comes a duty for businesses and organizations to employ best practices regarding their responsibilities in maintaining the electronically stored information (ESI) that these applications create.
Features

Avoid Making Tech Decisions In Crisis Mode
Some law firms are realizing that the hasty, though necessary, decisions made to facilitate remote work should be revisited or undone. Many of the tools implemented in an emergency are insufficient to withstand the increasing cybersecurity threats law firms are facing today. The good news, though, is that it's not too late to implement the right tech to protect your firm.
Features

Why Collaborate: The Future of Legal Services Is Human
It is no surprise that in this environment many lawyers are prioritizing qualitative factors, such as work-life balance and feeling appreciated and recognized at work, rather than compensation alone when choosing where to work. Why is it no surprise? Because many of their employers began valuing quality over quantity with their ALSPs years ago. And this shift might do even more for your organization.
Features

A Compliance Briefing for Privacy Officers on the New Canadian Consumer Privacy Protection Act
Part Two In a Series Part One of this series introduced the history of Canada's recently introduced Consumer Privacy Protection Act and reviewed the similarities with GDPR, such as data portability, the right not be forgotten, codes of practice, and a safe harbor provision. Part Two analyzes the new compliance requirement of valid consent.
Features

New Technologies Make for a Shifting Definition of 'Technical Competence'
While new and/or improving technologies may be challenging, they likely also present new opportunities which can facilitate delivering the best services at the best cost. Some solutions can be handled directly by law firms — but others will require the courts to approve, and, perhaps, even change of procedures to get with the times.
Features

Franchisors and Franchisees Make for Easy Cyber Targets
We are increasingly hearing about security breaches, data leaks and other kind of data theft in the franchise world. This is because frequently the franchise systems operate as a connected mass of franchisees all of whom collect, store and transmit a diverse array of consumer and personal data to the franchisor. In other words, franchisors and franchisee make a nice easy target for cyber theft.
Features

Jurisdictional License Requirements and Disparate Laws Are Hindering Law Firms' Fight Against Cybercrime
Some cybersecurity experts think the structure of law in the U.S. itself means that truly fighting against growing threat actors is a losing game. Take, for example, the fact that attorneys are largely limited by jurisdictional licensure requirements. While on the other hand, bad actors are often organized, unsaddled by jurisdictional challenges, and able to function as a large decentralized group.
Features

Will Other States Follow NY's Lead on Requiring Cybersecurity CLE?
New York has become the first state to add a requirement mandating that lawyers take legal education courses in cybersecurity, privacy and data protection. As cyberthreats will likely continue to both grow and evolve in sophistication, attorneys expect this requirement to be only a first step, with more states likely to soon follow.
Features

Text Messages In E-Discovery
This article looks beyond conspiracy theories and Secret Service slip-ups — or subterfuge, depending on one's perspective — to take a look at the law and technology of texts in e-discovery.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Why So Many Great Lawyers Stink at Business Development and What Law Firms Are Doing About ItWhy is it that those who are best skilled at advocating for others are ill-equipped at advocating for their own skills and what to do about it?Read More ›
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Blockchain Domains: New Developments for Brand OwnersBlockchain domain names offer decentralized alternatives to traditional DNS-based domain names, promising enhanced security, privacy and censorship resistance. However, these benefits come with significant challenges, particularly for brand owners seeking to protect their trademarks in these new digital spaces.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›