Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Florida Lawmakers Introduce Online Privacy Legislation Image

Florida Lawmakers Introduce Online Privacy Legislation

David M. Stauss & Malia Rogers

Florida lawmakers have introduced companion bills in the Florida House (HB 963) and Senate (SB 1670) that would create limited online privacy rights and obligations in the state. The legislation appears to be very similar to the Nevada Online Privacy Protection Act, which was amended last year to add a right to opt-out of sales of covered information.

Features

Legal Tech: E-Discovery and Seizure Orders Under the Defend Trade Secrets Act Image

Legal Tech: E-Discovery and Seizure Orders Under the Defend Trade Secrets Act

Philip Favro

Congress passed the Defend Trade Secrets with much fanfare, touting its potential to curtail both domestic and cross-border theft of American ingenuity and technology. The DTSA offers a unique and powerful remedy to aggrieved parties in their efforts to curb trade secret misappropriation: ex parte seizure of property containing trade secrets. This article provides a brief overview of DTSA seizure orders and discusses e-discovery considerations in connection with those orders.

Features

Hybrid Legal Document Review: Where Human and Artificial Intelligence Meet Image

Hybrid Legal Document Review: Where Human and Artificial Intelligence Meet

Brian Schrader

AI is in many ways still in its infancy, and it's important to realize that platforms utilizing this technology are heavily dependent on constant human interaction and training.

Features

A Look Behind, A Look Ahead: Part Two - E-Discovery Image

A Look Behind, A Look Ahead: Part Two - E-Discovery

Steve Salkin

Part Two of a Two-Part Article Cybersecurity Law & Strategy partnered with our ALM sibling Legaltech News to ask cybersecurity and e-discovery experts what they thought the key trends of 2019 and what they expect to see in 2020. Part Two looks at e-discovery.

Features

The Threat of Ransomware 2.0 for Law Practices Image

The Threat of Ransomware 2.0 for Law Practices

Gary Salman

During the past few months, there has been a significant paradigm shift in the cybersecurity world. Threat actors from Russia, in particular, have significantly enhanced their capabilities to target individual businesses and Managed Service Providers (MSPs) or IT companies. It is critical that lawyers, their firms and the companies they serve be aware of these threats and take the appropriate measures to proactively secure their own — and their clients' — sensitive and private information.

Features

Law Firms Adopt a Legal Operations Perspective Image

Law Firms Adopt a Legal Operations Perspective

Megan Miller

Law Firms Are Following the Lead of Their Corporate Clients In Implementing Legal Operations Methodologies Legal operations as a discipline within corporate legal departments is receiving more attention, funding and staffing over the last few years.

Features

More Regulation, Stronger Investigations and Home Tech Devices Concerns to Come in 2020, New Gibson Dunn Report Warns Image

More Regulation, Stronger Investigations and Home Tech Devices Concerns to Come in 2020, New Gibson Dunn Report Warns

Steve Salkin

On Data Privacy Day last month, Gibson Dunn released the eighth edition of its United States Cybersecurity and Data Privacy Outlook and Review. The report details trends that the privacy industry saw in 2019 from a legislative, regulatory and judicial perspective.

Features

GDPR-Based Objections to U.S. Discovery Requests: 2019 Year in Review Image

GDPR-Based Objections to U.S. Discovery Requests: 2019 Year in Review

Leslie Meredith

U.S. civil litigants faced with an obligation to produce "personal data" protected by GDPR can find themselves on the horns of a serious dilemma. Initial rulings addressing the tension between the broad scope of data protected by GDPR and the similarly broad scope of discovery under U.S. law revealed substantial skepticism that complying with a U.S. discovery request would expose parties to significant enforcement risk in the EU. This article takes a look at what arguments parties put forth in the past year, and make a few suggestions for how litigants can avoid violating one jurisdiction's law to satisfy another's courts.

Features

Data Breaches: Adding a New Layer to the Risk of Legal Malpractice Image

Data Breaches: Adding a New Layer to the Risk of Legal Malpractice

Karen Painter Randall & Steven A. Kroll

Those in the legal profession are not immune to a data breach. What's more, ethical obligations put lawyers and law firms at even greater risk for significant business, financial and reputational harm should they experience a cyberattack. Attorneys have both an ethical and legal duty to take reasonable steps to protect their clients' personal sensitive data against a cyberattack, or face serious ramifications.

Features

Legal Tech: E-Discovery Lessons from the Presidential Impeachment Proceedings Image

Legal Tech: E-Discovery Lessons from the Presidential Impeachment Proceedings

Joshua Hummel & Paul Fling

Whether we realize it or not, e-discovery has found a central place in the news during the Trump campaign and presidency, and in particular, during the impeachment proceedings.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The 'Sophisticated Insured' Defense
    A majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.
    Read More ›
  • Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric Code
    In an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.
    Read More ›