Features

The Roadmap of Litigation Analytics
Litigation analytics can be considered a roadmap of sorts — an important guide to ensure the legal professional arrives at the correct litigation strategy or business plan. However, like roadmaps, litigation analytics will only be useful if it's based on data that is complete and accurate.
Features

New State Statutes and Federal Guidelines Create Basket Weave of Cybersecurity Compliance
The U.S. doesn't have a federal cybersecurity law, but that doesn't mean there is no cybersecurity industry standard. There are regulations, case law, guidelines and state laws that, when combined, create an industry standard applicable to almost all business sectors.
Features

How to Fight Online Defamation
Internet tools are becoming more sophisticated in measuring the impact of disparaging and defamatory online statements, paving the way for affected business owners and celebrities to fight back by filing defamation suits seeking to recover damages for the harm to their reputation and brand value.
Features

Ransomware Insurance: Understanding the Developing Legal & Regulatory Landscape
In light of the ever-growing ransomware threat, it is important to understand the developing legal and regulatory landscape in order to take the proper steps at the first sign of an attack, including getting the insurance company involved immediately.
Features

21st Century Data Dumps and the 'Brady' Rule
What are the document dump rules that apply today? And how does the Brady rule apply to this evolving area of criminal practice? This article will address these issues.
Features

Legal Tech: The Secret Life of E-Discovery Funding
The true extent of funding amounts fueling legal tech and e-discovery software companies will likely never be widely shared. The reason is simple: Without regulatory requirements, the competitive risks of disclosing these investments regularly outweighs any potential benefits.
Features

What Makes Forensic Reports Different?
Why Are Courts Breaking the Rules and What Are the Unintended Consequences? A lesson learned by young lawyers everywhere is that internal, corporate investigations can be, and frequently are, privileged. However, it is difficult to square that concept with the recent spate of federal court opinions that have concluded that cybersecurity forensic reports generally are not privileged.
Features

Electronic Discovery Document Review: The Power of Feedback
Human review of documents will continue to play a huge part in the ediscovery process. Managing reviewer training and accuracy can make or break the budget for your matter.
Features

Competing by Connecting: In an Increasingly Crowded Market, Litigation Teams Must Leverage Centralized Technologies to Rise Above Their Rivals
Regardless of where each law firm currently stands in its innovation journey, it is crystal clear that the need to speed up the modernization of their technology solutions that facilitate connectivity, automation and workflow between their staff is real and immediate.
Features

Mobile Devices Can Provide Lucrative Back Door Into Businesses for Cyber Thieves
We live with the reality that the once ordinary communication tool is now a potent device that needs to be used responsibly on the basis that there is a cybercriminal fraternity hell-bent on accessing said devices for ill-gotten gain.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Artist Challenges Copyright Office Refusal to Register Award-Winning AI-Assisted WorkCopyright law has long struggled to keep pace with advances in technology, and the debate around the copyrightability of AI-assisted works is no exception. At issue is the human authorship requirement: the principle that a work must have a human author to be eligible for copyright protection. While the Copyright Office has previously cited this "bedrock requirement of copyright" to reject registrations, recent decisions have focused on the role of human authorship in the context of AI.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Sender Beware: Jurisdictional Risks of Pre-Litigation CommunicationsThe Federal Circuit recently clarified — and lowered — the threshold to exercise specific personal jurisdiction over an out of state declaratory judgment defendant.Read More ›
- Beach Boys Songs Written Decades Ago Triggered Current Quarrel With LawyersThere's current litigation in the ongoing Beach Boys litigation saga. A lawsuit filed in 2019 against Nevada residents Mike Love and his wife Jacquelyne in the U.S. District Court for the District of Nevada that alleges inaccurate payment by the Loves under the retainer agreement and seeks $84.5 million in damages.Read More ›
- Supreme Court Rules Rejection of Trademark License Does Not Rescind Rights of LicenseeMission Product Holdings, Inc. v. Tempnology, LLC The question is whether a debtor's rejection of its agreement granting a license "terminates rights of the licensee that would survive the licensor's breach under applicable nonbankruptcy law."Read More ›