Features

Midlevel Associates Frustrated By Firms' Lack of Tech-Savviness
In this year's Midlevel Associate Tech Survey, a number of associates at top firms once again said they were frustrated by their firms' lack of tech savviness and willingness to upgrade equipment. This echoes complaints from last year, and it should be noted that the survey regularly elicits similar criticisms about some of the world's richest law firms' technology.
Features

LJN Quarterly Update: 2024 Q3
The LJN Quarterly Update highlights some of the articles from the nine LJN Newsletters titles over the quarter. Articles include in-depth analysis and insights from lawyers and other practice area experts.
Features

Hyperlinked Documents: The Latest e-Discovery Challenge
As courts and discovery experts debate whether hyperlinked content should be treated the same as traditional attachments, legal practitioners are grappling with the technical and legal complexities of collecting, analyzing and reviewing these documents in real-world cases.
Features

Risks and Ad Fraud Protection In Digital Advertising
The ever-evolving digital marketing landscape, coupled with the industry-wide adoption of programmatic advertising, poses a significant threat to the effectiveness and integrity of digital advertising campaigns. This article explores various risks to digital advertising from pixel stuffing and ad stacking to domain spoofing and bots. It will also explore what should be done to ensure ad fraud protection and improve effectiveness.
Features

The Fourth Amendment and ESI
Courts have long acknowledged that searches of computers and other mediums storing electronic information (ESI) often involve a degree of intrusiveness much greater in quantity and in kind from searches of other containers. This article reviews some recent case law that spotlights this ever developing area of the law.
Features

The Benefits of Blockchain for e-Discovery and Data Preservation
As businesses across various industries increasingly adopt blockchain, it will become a critical source of discoverable electronically stored information. The potential benefits of blockchain for e-discovery and data preservation are substantial, making it an area of growing interest and importance.
Features

Phase 2 of PA's Insurance Data Security Law Is Coming — Record of Compliance Required
In 2023, Pennsylvania joined the growing number of states enacting the National Association of Insurance Commissioners' (NAIC) Model Law on Insurance Data Security. On Dec. 11, 2024 (just four months away), the second phase of the law goes into effect, which requires licensees to undertake detailed risk assessments, design and implement comprehensive and written cybersecurity programs, and, for some organizations, publicly certify compliance with the law.
Features

Legal Remedies Against Revenge Porn
Instant access to the internet has made sharing photographs online easy. Unfortunately, this has opened the door to revenge porn. Revenge porn is a serious violation of privacy that can have devastating consequences for victims. How might a victim of revenge porn counteract posts of compromising photographs to social media?
Features

Why High-Quality AI Data Is Crucial to Fighting Financial Crime
Integrating AI is more than just picking an AI solution. Counsels need to ensure they take a strategic approach to integrating this technology and understand the business and financial crime risk exposures they may face.
Features

Security Awareness Training: It's Time to Elevate Its Importance In Your Information Security Program
With the threat landscape changing quickly, security awareness training should include more than just a click-through video. There needs to be a focus from leadership on protecting firm assets and a near constant diligence on ensuring users know and understand the risks and how they might be compromised.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- The Anti-Assignment Override ProvisionsUCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›