Features

Strategy vs. Tactics: Two Sides of a Difficult Coin
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
Features

The Queen's Gambit: A Proactive Approach to Reducing Technology Vendors' Contracting Risk
There are numerous "gameplays" to reduce risks when selecting and hiring a technology vendor. Whether you are able to accept a risk and to what extent are not always clear. Just know that, like in chess, your opening move to an IT deal can be your most powerful.
Features

Key Issues In Cyber Insurance Policies
The surge in ransomware attacks has made familiarity with the provisions of cyber insurance essential for professionals in the entertainment industry, which is among prime targets of ransomware operatives.
Features

Sorting Through the Trump Financial Documents: eDiscovery Lawyer Tells How Prosecutors Search For Clues
A Q&A with Bobby Malhotra of Munger, Tolles & Olson LLP, Los Angeles.
Features

Reimagining Technology and Process in the Next Decade
A Q&A with a cross-section of law firm leaders to understand how the pandemic has impacted litigation in the short- and long-term.
Features

Work from Home Could Lead to Higher Cyber Insurance Claims
A look at the main software and application categories that increased during remote work and the vast implications for user privacy, corporate cybersecurity and cyber insurance.
Features

Preserving Snaps: Understanding Retention Features of Messaging Apps
The recent Doe v. Purdue University case out of the Northern District of Indiana — in which the court sanctioned plaintiff for failing to preserve relevant images and videos from his Snapchat application — teaches that counsel must understand the retention and deletion features of Snapchat and other messaging apps and social media if they are to help their clients preserve relevant ESI.
Features

Call for Nominations: Legalweek Leaders in Tech Law Awards 2022
Legalweek and Law.com are seeking nominations from lawyers who have handled cutting edge matters at the intersection of the law and technology.
Features

The Pandemic Job Market: From Drought to Pandemonium
This article gives historical context to the events that brought us to the current climate and provides guidance on how employers and employees can successfully navigate the ensuing complexities of job searching and hiring in the post-pandemic pandemonium. Part One of a Two-Part Article
Features

The Future of Litigation Workflow: Reimagining Technology and Process in the Next Decade
A cross-section of law firm leaders comment on the current state of litigation, remote training, building cohesive and collaborative multidisciplinary teams, leveraging technology to enhance litigation processes and outcomes, and looking at the practice of law in the next decade.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- New AI Suit By Authors Against AnthropicA new class action filed on behalf of several authors alleges that artificial intelligence startup Anthropic committed "brazen infringement" by using "hundreds of thousands" of copyrighted books to train "Claude," its flagship collection of large language models.Read More ›
- A 'Cloud Security Doctrine' for Law FirmsCloud computing may be here to stay, but is it truly safer than the solutions that it's outmoding? The Legal Cloud Computing Association (LCCA) thinks there's a path to greater security, publishing for law firms its first "Cloud Security Doctrine."Read More ›