Features
Privilege Logs: Strategy, Best Practices and Practical Advice
This article provides an overview of the different types of privilege logs, lays out best practices for negotiating ESI or privilege-log protocols, and discusses other issues that can occur with privilege logs in e-discovery.
Features
Data Minimization Meets Defensible Disposition: Just Say No to ROT and Over-Retention of Personal Information
Like a good diet and regular exercise for the body, data minimization and routine, defensible purging of outmoded documents are essential to maintaining healthy organizational information hygiene.
Features
Leaning on Trusted Partners to Drive Legal Tech Adoption and Avoid Failed Implementation
Turning to familiar, trusted partners to help navigate the unruly waters of change management, adoption and an ocean of new legal technology options.
Features
FTX Bankruptcy Sends Tremors Through Crypto Regulation
The sudden and spectacular crash of crypto-exchange FTX will send long-lasting tremors through both the nation's financial regulatory and bankruptcy landscapes.
Features
Attorneys Can Have Their (Hybrid) Cake and Eat It, Too
Lawyers, especially young lawyers, want to work from home. But there are downsides, such as a decrease in networking and personal relationships. How can technology help balance these out so that attorneys and law firms can have their cake and eat it too.
Features
Online Harassment In the Workplace
As businesses expand their use of augmented reality games for the purpose of meeting and recruitment, internet harassment has become more prominent, particularly workplace sexual harassment.
Features
A New Stage for Online Copyright Infringement Disputes
Copyright holders would be well advised to familiarize themselves with the Copyright Claims Board for resolving copyright infringement claims and to consider its benefits and potential downsides in bringing or defending copyright infringement actions.
Features
Cyber Insurance Costs Are on the Rise, But Law Firms Can't Afford to Forgo It
While law firms are feeling first-hand the impact of a cyber insurance market struggling to stabilize, the full extent of all the changes have yet to fully hit home.
Features
Legal Tech: Twitter's Future and E-discovery
Whether Twitter's doomsday is coming is still uncertain. But the threat of loss of years' worth of companies' data could be the impetus behind testing collection tools and reevaluating e-discovery processes.
Features
Incident Response Plans and Tabletop Exercises May Be A Waste of Time
Developing and delivering an IRP or TTE to improve the effectiveness of your incident response approach, in isolation, does not work. If your incident response preparation activity does not include some fundamental tactical actions, when the time comes and your house is on fire, your breach response will fail to meet your expectations.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- When It Comes to Trademark Searches, AI Misses the MarkArtificial intelligence tools powered by large language models have become valuable resources in the trademark process. Despite incredible progress in natural-language reasoning, AI tools still face fundamental limitations when it comes to performing even basic trademark searches. Here are five important reasons why.Read More ›
