Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Cyberattacks on U.S. Courts System Affect White-Collar Criminal Clients Image

Cyberattacks on U.S. Courts System Affect White-Collar Criminal Clients

Kat Black & Jon Campisi & Alyssa Aquino

The federal judiciary’s electronic case management system, known as CM/ECF, was hacked in large-scale cyberattacks this summer. Although court officials are mum on the possible perpetrators, news reports have said investigators suspect that the hacking could possibly have been perpetrated by Russian state-linked actors. The far-reaching breach has exposed the identities of cooperating witnesses and victims.

Features

A Business Guide to the U.S. AI-Privacy Crossroads Image

A Business Guide to the U.S. AI-Privacy Crossroads

Risa Boerner & Jillian Seifrit & David Walton

As AI becomes more embedded in everyday life and business operations, companies are facing a growing regulatory maze at the intersection of state privacy laws and emerging AI standards. This article explores the privacy laws that impact the use of AI and automated decision making and offers a practical guide for business leaders that aligns AI innovation with privacy expectations.

Features

Legal Teams Are Leaving Critical Mobile Evidence on the Table Image

Legal Teams Are Leaving Critical Mobile Evidence on the Table

Harsh Behl

One of the most revealing contradictions in today’s legal landscape is hiding in plain sight. Mobile data now plays a role in more than 75% of e-discovery matters, yet fewer than half of legal teams say they see it in even half of their cases. In an era of encrypted messaging, BYOD policies, and dispersed workforces, this isn’t just an oversight, it’s a liability.

Features

Cloud Migration for E-Discovery and RelativityOne Image

Cloud Migration for E-Discovery and RelativityOne

Adarsh Haltore

This is the first article in a two-part series dedicated to examining the evolving landscape of e-discovery for legal professionals. Part One addresses the complex challenges and established best practices associated with migrating e-discovery processes to the cloud, emphasizing perspectives from law firms and legal IT specialists.

Features

Cybersecurity Safe Harbor? There Be Dragons Image

Cybersecurity Safe Harbor? There Be Dragons

Chris Cronin

When we examine where the dragons be in cyber litigation, you’ll start to realize that there are safer, deeper ports in which to anchor. And those are just about every state in the Union and every federal agency that has cybersecurity regulations where “reasonability” is the standard of care.

Features

Beyond Pilots: Smarter Paths to Generative AI in Law Firms Image

Beyond Pilots: Smarter Paths to Generative AI in Law Firms

Don Jaycox & Dan Safran

Stop running pilot after pilot with different tools but failing to move beyond testing. Start with business outcomes. Redesign processes and guardrails. Rethink pricing models. And then, with clarity of purpose, choose the tools that enable the future of legal work.

Features

How AI Is Transforming the Buyer Journey: The End of Google, Part One Image

How AI Is Transforming the Buyer Journey: The End of Google, Part One

Patricia Nagy

The end of Google page one is not the end of discovery. It is the beginning of a new discovery model — one where the winners are those who align with how buyers actually search, learn, and decide in the age of AI.

Features

Preserving Business Data When Employees Leave: A Mobile Device Offboarding Checklist Image

Preserving Business Data When Employees Leave: A Mobile Device Offboarding Checklist

Jason Purviance

When employees leave, they don’t just walk out the door with their personal belongings, they often take with them valuable institutional knowledge, IP, and other business-critical data. Without proper data retention policies for departing employees, organizations risk losing essential information, exposing themselves to security threats, and facing costly legal consequences.

Features

AI Isn’t Replacing Lawyers — It’s Changing How They Work Image

AI Isn’t Replacing Lawyers — It’s Changing How They Work

Trudy Knockless

Instead of eliminating legal jobs, generative AI can be transformative for the in-house role by stripping away repetitive tasks and giving lawyers room to focus on higher-value work.

Features

The Ovsiannikov Breach and Why Enhanced Due Diligence Must Become a Compliance Standard Image

The Ovsiannikov Breach and Why Enhanced Due Diligence Must Become a Compliance Standard

Matt Winlaw

In April 2025, the United Kingdom secured its first-ever criminal conviction for a breach of Russian sanctions — a milestone in the global enforcement landscape. But beneath the headline lies a far more pressing narrative: how a sanctioned Politically Exposed Person (PEP) was able to enter the UK, open a bank account, and launder funds through mainstream financial and non-financial institutions without detection.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Bankruptcy Sales: Finding a Diamond In the Rough
    There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
    Read More ›
  • Restrictive Covenants Meet the Telecommunications Act of 1996
    Congress enacted the Telecommunications Act of 1996 to encourage development of telecommunications technologies, and in particular, to facilitate growth of the wireless telephone industry. The statute's provisions on pre-emption of state and local regulation have been frequently litigated. Last month, however, the Court of Appeals, in <i>Chambers v. Old Stone Hill Road Associates (see infra<i>, p. 7) faced an issue of first impression: Can neighboring landowners invoke private restrictive covenants to prevent construction of a cellular telephone tower? The court upheld the restrictive covenants, recognizing that the federal statute was designed to reduce state and local regulation of cell phone facilities, not to alter rights created by private agreement.
    Read More ›