Features

Legal Tech: The Intersection of E-Discovery and Cybersecurity: You've Come a Long Way, Baby
Data is an asset and a liability. It fits into both accounting columns and will not fail to be used against a corporate entity if not secured properly. Databases contain trade secrets, personally identifiable information, HIPAA-protected health care information, proprietary information and classified data. As the size of databases grew and the importance of data became more evident, one thing became apparent: the information stored in those repositories had to be kept secure.
Features

Working Remotely? Here Are 4 Often-Overlooked Steps That Secure Your Data
By the time you read this, Americans will have been working from home for more than three months. This has never happened before in this country during the age of technology. As millions logged on to their home networks and personal devices in an attempt to keep their companies afloat, cybersecurity issues rose to the forefront of the many issues that companies had to manage.
Features

Synchronizing Legal Hold Requirements With Consumer Requests for Data Deletion
The biggest challenge with any legal hold process is ensuring that potentially relevant data is actually preserved. But with evolving requirements for how data is managed by new data privacy laws like the CCPA and the GDPR, it's become harder to secure data by simply sending a legal hold and assuming the custodian will do their duty to preserve it.
Features

Preparing for the LIBOR Phase Out: Contract Remediation Starts with Contract Intelligence
The London Interbank Offered Rate has long been the global basis for agreements that include a variable interest rate component. However, LIBOR would be replaced by other benchmarks by the end of 2021. Key to assessing risk of exposure, quantifying the financial impact, developing remediation plans and communicating material information to stakeholders will be the identification, analysis and remediation of LIBOR-based contracts.
Features

How To Avoid Cybersecurity Challenges Brought On By the Pandemic
As the current pandemic has forced much of the world into virtual workforce mode, cybercriminals have seized on the uncertainty of the current times to launch new and creative offensives. Fears surrounding COVID-19 are high, conspiracy theories are running rampant, and cyberattackers are counting on stress and distraction to decrease our vigilance against intrusions.
Features

French Law on Removing Objectionable Online Content Rejected As Too Broad
A new French law that would have required such social media platforms as Facebook to take down objectionable content within 24 hours has been rejected by France's Constitutional Council as a disproportionate response to the proliferation of hate speech online.
Features

Lessons Learned from Recent FTC Data Security Enforcement Orders
Proposed class actions against Zoom are illustrative of a challenge many businesses face: what is "reasonable" data security? The FTC's key data-security-related enforcement can help guide businesses in developing their data security programs.
Features

Legal Tech: How to Streamline Your eDiscovery and Plan for the Future
At law firms, attorneys will need to sustain the high quality of work they do in normal times, albeit with reduced budgets. The good news is that with ediscovery — an essential but expensive part of the litigation process — advances in technology since America's last recession have made it possible to save money and time by adopting a more modernized and comprehensive approach.
Features

Legal Tech: Embracing Diversity in the E-Discovery New Normal
The COVID-19 pandemic creates opportunities for the ediscovery industry, like the law and technology industries, to expand its engagement and retention of diverse talent. Here are some actions that can be taken today.
Features

Where Will The Needle Land? COVID-19 Contact Tracing v. Protecting Personal Privacy
Governments and businesses alike are considering how to leverage new technologies to make contact tracing efforts more effective by digitally monitoring our social interactions and physical locations. But such innovative contact tracing methods raise a host of privacy concerns, forcing a reckoning with how we balance privacy and public health.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The 'Sophisticated Insured' DefenseA majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.Read More ›
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- The Brave New World of Cybersecurity Due Diligence in Mergers and Acquisitions: Pitfalls and OpportunitiesLike poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.Read More ›
- Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric CodeIn an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.Read More ›
- Guidance on Distributions As 'Disbursements' and U.S. Trustee FeesIn a recent case from the Bankruptcy Court for the District of Delaware, In re Paragon Offshore PLC, the bankruptcy court provided guidance on whether a post-plan effective date litigation trust's distributions constituted disbursements subject to the U.S. Trustee fee "tax."Read More ›