On Jan. 9, the U.S. Supreme Court heard oral argument on whether the attorney-client privilege protects against disclosure of dual-purpose communications — where the communications contain both legal and nonlegal advice.
- February 01, 2023Kelly Lavelle
On Feb. 15 at 4 p.m. ET, Cybersecurity Law & Strategy will present a complimentary live webinar titled "The Crypto Landscape Post-FTX." The presentation will cover the current status and near-future outlook for the blockchain (crypto) sector.
February 01, 2023CLS StaffThe most common questions and key elements of a negligence claim are whether the defendant breached a duty of care, whether there is any injury as a result of the defendant's breach of any purported duty of care, and whether the defendant's alleged breach caused the plaintiff any damages. While these essential questions and elements apply with equal force in data breach litigation, the difficult question to answer in these cases is "what is the value, if any, of your injury or damages?"
January 01, 2023Brian E. Middlebrook, Tyrik Jiang, John T. Mills and Joseph SalvoFor a legal CIO, one of the key responsibilities is to establish that the organization has the right technology in place to support its operations and achieve its business goals. This can be challenging, as there are many factors to consider when choosing new technology for your organization. One bad decision can have a material impact on not only the bottom line, but on the ability of your firm to compete in an ever-changing legal market.
January 01, 2023Ted TheodoropoulosPart One of a Two-Part Article: Challenges and solutions in document review HSR second requests have become increasingly common in mergers or acquisitions that meet the premerger reporting threshold, which in 2022 was a transaction value of more than $101 million. The burdens of complying with second requests are onerous. The mere thought of undergoing such an exercise tends to strike fear in the heart of the legal department. In this article series, we'll outline the major challenges of second requests, suggest strategies to overcome them, and discuss how to face a second request with equanimity and confidence.
January 01, 2023Jessica Robinson and Amit DungaraniRecognizing that this is a time of innovation, one way law firms can 'prepare for a future we can't yet see' is through leveraging two key levers: the need for empathy and iteration.
January 01, 2023Alaa PashaThe FTX bankruptcy caps a very difficult 2022 for the entire blockchain industry, spanning exchanges to decentralized finance to non-fungible tokens (NFTs). Blockchain and crypto skeptics are shouting "I told you so," while investors watch billions of investment dollars evaporate under the harsh light of the bankruptcies of Celsius, Compute North and now FTX.
January 01, 2023Chris Sloan and Justin DanielsThreats of cyberattacks have not only made legal professionals more wary — especially as legal teams in firms and in-house are increasingly the target of cyber hackers — but it has also changed their relationship with vendors.
January 01, 2023Cassandre CoyerThis article provides an overview of the different types of privilege logs, lays out best practices for negotiating ESI or privilege-log protocols, and discusses other issues that can occur with privilege logs in e-discovery.
January 01, 2023Bansri McCarthy, Leonard Impagliazzo and Tara LawlerLike a good diet and regular exercise for the body, data minimization and routine, defensible purging of outmoded documents are essential to maintaining healthy organizational information hygiene.
December 01, 2022Martin Tully and Nick Snavely










