Features
Ransomware Insurance: Understanding the Developing Legal & Regulatory Landscape
In light of the ever-growing ransomware threat, it is important to understand the developing legal and regulatory landscape in order to take the proper steps at the first sign of an attack, including getting the insurance company involved immediately.
Features
21st Century Data Dumps and the 'Brady' Rule
What are the document dump rules that apply today? And how does the Brady rule apply to this evolving area of criminal practice? This article will address these issues.
Features
Legal Tech: The Secret Life of E-Discovery Funding
The true extent of funding amounts fueling legal tech and e-discovery software companies will likely never be widely shared. The reason is simple: Without regulatory requirements, the competitive risks of disclosing these investments regularly outweighs any potential benefits.
Features
What Makes Forensic Reports Different?
Why Are Courts Breaking the Rules and What Are the Unintended Consequences? A lesson learned by young lawyers everywhere is that internal, corporate investigations can be, and frequently are, privileged. However, it is difficult to square that concept with the recent spate of federal court opinions that have concluded that cybersecurity forensic reports generally are not privileged.
Features
Electronic Discovery Document Review: The Power of Feedback
Human review of documents will continue to play a huge part in the ediscovery process. Managing reviewer training and accuracy can make or break the budget for your matter.
Features
Competing by Connecting: In an Increasingly Crowded Market, Litigation Teams Must Leverage Centralized Technologies to Rise Above Their Rivals
Regardless of where each law firm currently stands in its innovation journey, it is crystal clear that the need to speed up the modernization of their technology solutions that facilitate connectivity, automation and workflow between their staff is real and immediate.
Features
Mobile Devices Can Provide Lucrative Back Door Into Businesses for Cyber Thieves
We live with the reality that the once ordinary communication tool is now a potent device that needs to be used responsibly on the basis that there is a cybercriminal fraternity hell-bent on accessing said devices for ill-gotten gain.
Features
Hybrid Work Environments Add to Internal Cybersecurity Risk
Are law firms truly prepared for evolving threats on the horizon, especially with hybrid work arrangements gaining momentum?
Features
9th Circuit: Police Violated Google Users' Privacy Rights After Automated Email Scan Detected Child Pornography
A federal appeals court found that law enforcement violated a Google user's constitutional rights when it opened email attachments the platform flagged as child pornography through an automated system.
Features
Flat Fee or Consumption-Based E-Discovery Pricing? Depends on Who You Ask
Being charged per gigabyte by an e-discovery software platform isn't new, but it can still be a budgetary drain for law firms that handle many large e-discovery matters.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- Mixed Ruling in Jefferson Starship Band Name SuitWhat's in a rock band's name? Plenty, if you are talking about Jefferson Starship, which goes back more than 40 years, has had more than 30 members and was born from the 1960s psychedelic rock band Jefferson Airplane.Read More ›
