Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

One Solution on How the U.S. Government Can Compete for Top Cybersecurity Professionals Image

One Solution on How the U.S. Government Can Compete for Top Cybersecurity Professionals

Daniel B. Garrie & Douglas A. Smith

While the private sector is undeniably in great need of cybersecurity professionals, the public sector must compete for the limited supply of qualified candidates, particularly those capable of filling high-level positions.

Features

Legal Tech: EU E-discovery 'Phenomenon' Comes With Unique Issues Image

Legal Tech: EU E-discovery 'Phenomenon' Comes With Unique Issues

Frank Ready

For a jurisdiction with little to no discovery process, the EU and its stringent privacy requirements may have already emerged as the next frontier for e-discovery providers looking to expand their business outside of the United States. However, the region's relative inexperience with e-discovery could still emerge as a hindrance for vendors eyeing an EU-based expansion.

Features

How Should Directors Respond to the SolarWinds Attack Image

How Should Directors Respond to the SolarWinds Attack

Paul A. Ferrillo

This article is not about "who did what wrong" or "what nation-state commenced this attack." It's really more about is, "if I am a Director, what should I be thinking about the SolarWinds attack?"

Features

The Situation of Your Company's CISO and How It Impacts Data Security Image

The Situation of Your Company's CISO and How It Impacts Data Security

Kenya Parrish-Dixon

The intensity of information security briefings often leads to organizations tucking the CISO under the CIO instead. After all, all technology is related, right? This is a huge mistake, and it is wreaking havoc on American data security.

Features

The Unheralded Value of a Contract Image

The Unheralded Value of a Contract

Andrew Banquer

The most important part of a contract is the data that it generates. If you take all that data from each contract, then aggregate, organize and analyze it, you will have critical insights into the overall effectiveness of your contracting process and the way you transact business.

Features

Should Your Clients' Involvement With Cryptocurrency Scare You? Image

Should Your Clients' Involvement With Cryptocurrency Scare You?

Ross Benson & Robert N. Driscoll

It's not a matter of whether you have an interest in crypto, think it's all a bizarre techno-bubble, the eventual replacement for fiat currency, or somewhere in between. The fact of the matter is your clients, and future clients, are more likely than ever to have a connection to this market, and a brief review of the headlines can make this prospect seem terrifying.

Features

The World of NFTs Image

The World of NFTs

Christine K. Au-Yeung

NFTs have been all the rage lately. So what exactly are they?

Features

Can You Hear Me Now? — Privacy of Discussions Image

Can You Hear Me Now? — Privacy of Discussions

Leonard Deutchman 

This article looks at privacy discussions, focusing on what in the circumstances discussed renders the IT data private and whether the criteria relied upon when courts and others in the discussion determine that the data is or is not private is truly determinative, as well as properly understood.

Features

How to Avoid 'Privacy Debt' Image

How to Avoid 'Privacy Debt'

Catherine Zhu

For many tech companies today, their products and business model require the collection and storage of data. At the same time, a failure to build adequate data protection technology, processes, and operations will continuously generate "privacy debt" for the business. The accumulation of this "privacy debt" can eventually turn away customers, attract regulatory penalties, and create an existential risk for the company.

Features

Legal Tech: Time to Move from Email to Centralized Platform for E-Discovery Image

Legal Tech: Time to Move from Email to Centralized Platform for E-Discovery

Wendy Leibowitz

Lawyers need to move away from email as a project management tool to a centralized project management platform — akin to a huge, shared, digital whiteboard — where all production requests are entered on a form that meets litigation support needs.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES