Features

Navigating APT Intrusions
Advanced Persistent Threat (APT) intrusions are sophisticated cyber-attacks carried out by well-funded and organized cyber-criminals. The attacks are designed to establish persistence using various tactics, techniques and procedures that are intended to avoid detection and mimic authorized activity in the environment, known as "living off the land."
Features

Florida Lawmakers Introduce Online Privacy Legislation
Florida lawmakers have introduced companion bills in the Florida House (HB 963) and Senate (SB 1670) that would create limited online privacy rights and obligations in the state. The legislation appears to be very similar to the Nevada Online Privacy Protection Act, which was amended last year to add a right to opt-out of sales of covered information.
Features

Legal Tech: E-Discovery and Seizure Orders Under the Defend Trade Secrets Act
Congress passed the Defend Trade Secrets with much fanfare, touting its potential to curtail both domestic and cross-border theft of American ingenuity and technology. The DTSA offers a unique and powerful remedy to aggrieved parties in their efforts to curb trade secret misappropriation: ex parte seizure of property containing trade secrets. This article provides a brief overview of DTSA seizure orders and discusses e-discovery considerations in connection with those orders.
Features

Hybrid Legal Document Review: Where Human and Artificial Intelligence Meet
AI is in many ways still in its infancy, and it's important to realize that platforms utilizing this technology are heavily dependent on constant human interaction and training.
Features

A Look Behind, A Look Ahead: Part Two - E-Discovery
Part Two of a Two-Part Article Cybersecurity Law & Strategy partnered with our ALM sibling Legaltech News to ask cybersecurity and e-discovery experts what they thought the key trends of 2019 and what they expect to see in 2020. Part Two looks at e-discovery.
Features

The Threat of Ransomware 2.0 for Law Practices
During the past few months, there has been a significant paradigm shift in the cybersecurity world. Threat actors from Russia, in particular, have significantly enhanced their capabilities to target individual businesses and Managed Service Providers (MSPs) or IT companies. It is critical that lawyers, their firms and the companies they serve be aware of these threats and take the appropriate measures to proactively secure their own — and their clients' — sensitive and private information.
Features

Law Firms Adopt a Legal Operations Perspective
Law Firms Are Following the Lead of Their Corporate Clients In Implementing Legal Operations Methodologies Legal operations as a discipline within corporate legal departments is receiving more attention, funding and staffing over the last few years.
Features

More Regulation, Stronger Investigations and Home Tech Devices Concerns to Come in 2020, New Gibson Dunn Report Warns
On Data Privacy Day last month, Gibson Dunn released the eighth edition of its United States Cybersecurity and Data Privacy Outlook and Review. The report details trends that the privacy industry saw in 2019 from a legislative, regulatory and judicial perspective.
Features

GDPR-Based Objections to U.S. Discovery Requests: 2019 Year in Review
U.S. civil litigants faced with an obligation to produce "personal data" protected by GDPR can find themselves on the horns of a serious dilemma. Initial rulings addressing the tension between the broad scope of data protected by GDPR and the similarly broad scope of discovery under U.S. law revealed substantial skepticism that complying with a U.S. discovery request would expose parties to significant enforcement risk in the EU. This article takes a look at what arguments parties put forth in the past year, and make a few suggestions for how litigants can avoid violating one jurisdiction's law to satisfy another's courts.
Features

Data Breaches: Adding a New Layer to the Risk of Legal Malpractice
Those in the legal profession are not immune to a data breach. What's more, ethical obligations put lawyers and law firms at even greater risk for significant business, financial and reputational harm should they experience a cyberattack. Attorneys have both an ethical and legal duty to take reasonable steps to protect their clients' personal sensitive data against a cyberattack, or face serious ramifications.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Meet the Lawyer Working on Inclusion Rider LanguageAt the Oscars in March, Best Actress winner Frances McDormand made “inclusion rider” go viral. But Kalpana Kotagal, a partner at Cohen Milstein Sellers & Toll had already worked for months to write the language for such provisions. Kotagal was developing legal language for contract provisions that Hollywood's elite could use to require studios and other partners to employ diverse workers on set.Read More ›
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- From the PTO to the FDA: What to Consider When Branding Clinical TrialsThe legal implications of branding generally arise initially for companies during the process of selecting a company name and any initial product or service names. For drug development companies, however, careful consideration should also be paid to the implications of branding a clinical trial.Read More ›
- Disconnect Between In-House and Outside Counsel'Disconnect Between In-House and Outside Counsel is a continuation of the discussion of client expectations and the disconnect that often occurs. And although the outside attorneys should be pursuing how inside-counsel actually think, inside counsel should make an effort to impart this information without waiting to be asked.Read More ›