Features

Strategy vs. Tactics: Two Sides of a Difficult Coin
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
Features

The Queen's Gambit: A Proactive Approach to Reducing Technology Vendors' Contracting Risk
There are numerous "gameplays" to reduce risks when selecting and hiring a technology vendor. Whether you are able to accept a risk and to what extent are not always clear. Just know that, like in chess, your opening move to an IT deal can be your most powerful.
Features

Key Issues In Cyber Insurance Policies
The surge in ransomware attacks has made familiarity with the provisions of cyber insurance essential for professionals in the entertainment industry, which is among prime targets of ransomware operatives.
Features

Sorting Through the Trump Financial Documents: eDiscovery Lawyer Tells How Prosecutors Search For Clues
A Q&A with Bobby Malhotra of Munger, Tolles & Olson LLP, Los Angeles.
Features

Reimagining Technology and Process in the Next Decade
A Q&A with a cross-section of law firm leaders to understand how the pandemic has impacted litigation in the short- and long-term.
Features

Work from Home Could Lead to Higher Cyber Insurance Claims
A look at the main software and application categories that increased during remote work and the vast implications for user privacy, corporate cybersecurity and cyber insurance.
Features

Preserving Snaps: Understanding Retention Features of Messaging Apps
The recent Doe v. Purdue University case out of the Northern District of Indiana — in which the court sanctioned plaintiff for failing to preserve relevant images and videos from his Snapchat application — teaches that counsel must understand the retention and deletion features of Snapchat and other messaging apps and social media if they are to help their clients preserve relevant ESI.
Features

Call for Nominations: Legalweek Leaders in Tech Law Awards 2022
Legalweek and Law.com are seeking nominations from lawyers who have handled cutting edge matters at the intersection of the law and technology.
Features

The Pandemic Job Market: From Drought to Pandemonium
This article gives historical context to the events that brought us to the current climate and provides guidance on how employers and employees can successfully navigate the ensuing complexities of job searching and hiring in the post-pandemic pandemonium. Part One of a Two-Part Article
Features

The Future of Litigation Workflow: Reimagining Technology and Process in the Next Decade
A cross-section of law firm leaders comment on the current state of litigation, remote training, building cohesive and collaborative multidisciplinary teams, leveraging technology to enhance litigation processes and outcomes, and looking at the practice of law in the next decade.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Rights and Obligations In Patent LicensesThe owner of a commercially successful patent may have competing desires. On one hand, the patent owner wants to protect the patent and secure its maximum benefit; on the other hand, the patent owner wants to avoid enforcement litigation with competitors because it is expensive and puts the patent at risk.Read More ›
- Foreseeability as a Bar to Proof of Patent InfringementThe doctrine of equivalents is a rule of equity adopted more than 150 years ago by the U.S. Supreme Court. Prosecution history estoppel is a rule of equity that controls access to the doctrine. In May 2002, the Court was called upon to revisit the doctrine and the estoppel rule in <i>Festo Corp. v. Shoketsu Kinzoku Kogyo Kabushiki Co. Ltd.</i> Ultimately the Court reaffirmed the doctrine and expanded the estoppel rule, but not without inciting heated debate over the Court's rationale — especially since it included a new and controversial foreseeability test in its analysis for estoppel.Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›