Features

Virtual Reality or the New Reality of Virtual Practice?
In response to the worst period on record for cyber attacks, the ABA published Formal Opinion 498 to address practicing law outside of the traditional brick-and-mortar office environment. It reminds lawyers that while the ABA Model Rules permit virtual practice, they provide minimum requirements and recommendations for virtual practice, particularly in the areas of competence, confidentiality and supervision.
Features

Strategy vs. Tactics: Two Sides of a Difficult Coin
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
Features

The Queen's Gambit: A Proactive Approach to Reducing Technology Vendors' Contracting Risk
There are numerous "gameplays" to reduce risks when selecting and hiring a technology vendor. Whether you are able to accept a risk and to what extent are not always clear. Just know that, like in chess, your opening move to an IT deal can be your most powerful.
Features

Key Issues In Cyber Insurance Policies
The surge in ransomware attacks has made familiarity with the provisions of cyber insurance essential for professionals in the entertainment industry, which is among prime targets of ransomware operatives.
Features

Sorting Through the Trump Financial Documents: eDiscovery Lawyer Tells How Prosecutors Search For Clues
A Q&A with Bobby Malhotra of Munger, Tolles & Olson LLP, Los Angeles.
Features

Reimagining Technology and Process in the Next Decade
A Q&A with a cross-section of law firm leaders to understand how the pandemic has impacted litigation in the short- and long-term.
Features

Work from Home Could Lead to Higher Cyber Insurance Claims
A look at the main software and application categories that increased during remote work and the vast implications for user privacy, corporate cybersecurity and cyber insurance.
Features

Preserving Snaps: Understanding Retention Features of Messaging Apps
The recent Doe v. Purdue University case out of the Northern District of Indiana — in which the court sanctioned plaintiff for failing to preserve relevant images and videos from his Snapchat application — teaches that counsel must understand the retention and deletion features of Snapchat and other messaging apps and social media if they are to help their clients preserve relevant ESI.
Features

Call for Nominations: Legalweek Leaders in Tech Law Awards 2022
Legalweek and Law.com are seeking nominations from lawyers who have handled cutting edge matters at the intersection of the law and technology.
Features

The Pandemic Job Market: From Drought to Pandemonium
This article gives historical context to the events that brought us to the current climate and provides guidance on how employers and employees can successfully navigate the ensuing complexities of job searching and hiring in the post-pandemic pandemonium. Part One of a Two-Part Article
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The 'Sophisticated Insured' DefenseA majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.Read More ›
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- The Brave New World of Cybersecurity Due Diligence in Mergers and Acquisitions: Pitfalls and OpportunitiesLike poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.Read More ›
- Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric CodeIn an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.Read More ›
- Guidance on Distributions As 'Disbursements' and U.S. Trustee FeesIn a recent case from the Bankruptcy Court for the District of Delaware, In re Paragon Offshore PLC, the bankruptcy court provided guidance on whether a post-plan effective date litigation trust's distributions constituted disbursements subject to the U.S. Trustee fee "tax."Read More ›