Features

New State Statutes and Federal Guidelines Create Basket Weave of Cybersecurity Compliance
The U.S. doesn't have a federal cybersecurity law, but that doesn't mean there is no cybersecurity industry standard. There are regulations, case law, guidelines and state laws that, when combined, create an industry standard applicable to almost all business sectors.
Features

How to Fight Online Defamation
Internet tools are becoming more sophisticated in measuring the impact of disparaging and defamatory online statements, paving the way for affected business owners and celebrities to fight back by filing defamation suits seeking to recover damages for the harm to their reputation and brand value.
Features

Ransomware Insurance: Understanding the Developing Legal & Regulatory Landscape
In light of the ever-growing ransomware threat, it is important to understand the developing legal and regulatory landscape in order to take the proper steps at the first sign of an attack, including getting the insurance company involved immediately.
Features

21st Century Data Dumps and the 'Brady' Rule
What are the document dump rules that apply today? And how does the Brady rule apply to this evolving area of criminal practice? This article will address these issues.
Features

Legal Tech: The Secret Life of E-Discovery Funding
The true extent of funding amounts fueling legal tech and e-discovery software companies will likely never be widely shared. The reason is simple: Without regulatory requirements, the competitive risks of disclosing these investments regularly outweighs any potential benefits.
Features

What Makes Forensic Reports Different?
Why Are Courts Breaking the Rules and What Are the Unintended Consequences? A lesson learned by young lawyers everywhere is that internal, corporate investigations can be, and frequently are, privileged. However, it is difficult to square that concept with the recent spate of federal court opinions that have concluded that cybersecurity forensic reports generally are not privileged.
Features

Electronic Discovery Document Review: The Power of Feedback
Human review of documents will continue to play a huge part in the ediscovery process. Managing reviewer training and accuracy can make or break the budget for your matter.
Features

Competing by Connecting: In an Increasingly Crowded Market, Litigation Teams Must Leverage Centralized Technologies to Rise Above Their Rivals
Regardless of where each law firm currently stands in its innovation journey, it is crystal clear that the need to speed up the modernization of their technology solutions that facilitate connectivity, automation and workflow between their staff is real and immediate.
Features

Mobile Devices Can Provide Lucrative Back Door Into Businesses for Cyber Thieves
We live with the reality that the once ordinary communication tool is now a potent device that needs to be used responsibly on the basis that there is a cybercriminal fraternity hell-bent on accessing said devices for ill-gotten gain.
Features

Hybrid Work Environments Add to Internal Cybersecurity Risk
Are law firms truly prepared for evolving threats on the horizon, especially with hybrid work arrangements gaining momentum?
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Clause & EffectNet-Profit Rights/Movies Based on TV Shows<br>Insurance/Contract-Breach Exclusion<br>Insurance/Copyright-Infringement CoverageRead More ›
- Rights and Obligations In Patent LicensesThe owner of a commercially successful patent may have competing desires. On one hand, the patent owner wants to protect the patent and secure its maximum benefit; on the other hand, the patent owner wants to avoid enforcement litigation with competitors because it is expensive and puts the patent at risk.Read More ›
- Foreseeability as a Bar to Proof of Patent InfringementThe doctrine of equivalents is a rule of equity adopted more than 150 years ago by the U.S. Supreme Court. Prosecution history estoppel is a rule of equity that controls access to the doctrine. In May 2002, the Court was called upon to revisit the doctrine and the estoppel rule in <i>Festo Corp. v. Shoketsu Kinzoku Kogyo Kabushiki Co. Ltd.</i> Ultimately the Court reaffirmed the doctrine and expanded the estoppel rule, but not without inciting heated debate over the Court's rationale — especially since it included a new and controversial foreseeability test in its analysis for estoppel.Read More ›