Features

Cybersecurity In the Legal Space: Is Your Organization Prepared?
Organizations that continue to be complacent about data security ignore the considerable risks posed by a breach: extended downtime, loss of billable hours, destruction or loss of sensitive data and work product, and the potentially catastrophic costs associated with repairing the damage — both to their technology infrastructure and to their reputation and brand.
Features

GDPR & CCPA Are Just the Beginning
How Middle Market Companies Can Shore Up Their Data Privacy The most significant overhaul to the EU's data privacy policies in over 20 years, with extraterritorial reach, forced American businesses to remediate, and in some cases, overhaul their data privacy governance programs. But the GPDR was just the beginning. Organizations seeking compliance with the growing number of data privacy regulations will need to remain vigilant, especially for organizations that rely heavily on personal data.
Features

The State of the U.S. Privacy Job Market, 2019: Part Two
A Reflection on the Year Behind, the Years Ahead, and Why Privacy Means So Much to Us Part Two of a Two-Part Article Part two of The State of the U.S. Privacy Job Market, 2019 will outline what is happening within service providers, consultancies, and vendors will touch briefly on government agencies and will predict the near-future state of the U.S. privacy job market.
Features

Legal Tech: Summer 2019 E-Discovery Case Law Review
A review of recent cases involving e-discovery.
Features

Legal Tech: Litigation Support, E-discovery and the Recovery of Costs
The Data Explosion vs. Recovery Model Stagnation For law firms, the pace of exponential growth of data is a substantial problem — mainly due to the fact that the law firm business model of processing, hosting and storing this avalanche of client data, however, has not evolved as quickly as the data itself.
Features

Legal Tech: What GCs Want from Legal Technology
Legal Tech Companies Have to Get Out of Their Own Way In Vying for Law Department Adoption The legal technology industry has some significant hurdles to overcome in its increased push to sell into legal departments, general counsel say, admitting they themselves are part of the problem.
Features

It's Time to Take Third-Party Risk Seriously
The use of new technologies such as the Internet of Things (IoT), mobile and cloud by vendors add to the question: Where is my data, and how can I protect it when it is in someone else's hands? In the hustle and bustle of daily business, third parties often become the overlooked or unwitting accomplice in criminal activities.
Features

The State of the U.S. Privacy Job Market, 2019
A Reflection on the Year Behind, the Years Ahead and Why Privacy Means So Much to Us Part One of a Two-Part Article In just over a year since GDPR Day, privacy by design has made privacy as a profession one of the fastest growing and hottest verticals in and outside of the legal job market.
Features

Legislative Heat Wave: A Mid-Year Review of Upcoming Cybersecurity Laws and Enforcement Activity
While legislation to enhance data privacy rights and obligations continue to make headlines, regulators and legislators are also stepping up their cybersecurity expectations. In the first half of 2019, a number of states have updated their existing data breach notification laws and passed new cybersecurity requirements.
Features

How to Keep Mobile Data Safe: The Case for On-Device AI
Bring Your Own Device is one of the biggest compliance-related issues companies face today, and when it comes to security risks, law firms are prime targets. Considering law firms are built on their reputation, firms must make every assurance that the technology they use will protect their data.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- When Is a Repair Structural or Nonstructural Under a Commercial Lease?A common question that commercial landlords and tenants face is which of them is responsible for a repair to the subject premises. These disputes often center on whether the repair is "structural" or "nonstructural."Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- The Cost of Making PartnerMaking partner isn't cheap, and the cost is more than just the years of hard work and stress that associates put in as they reach for the brass ring.Read More ›