Features

How to Keep Mobile Data Safe: The Case for On-Device AI
Bring Your Own Device is one of the biggest compliance-related issues companies face today, and when it comes to security risks, law firms are prime targets. Considering law firms are built on their reputation, firms must make every assurance that the technology they use will protect their data.
Features

Cybersecurity Spending on the Rise in 2019
As data security challenges continue to escalate, many law firms and corporate legal departments are upping their efforts to strengthen cyber defenses and minimize risks.
Features

SHIELD Act Signed in NY
<b><i>Defines Data Breach and Requires Data Security Controls</b></i><p>New York has brought itself into line with a number of states concerning how they define a data breach, and, where applicable, what substantive security controls they require.
Features

Just Say No to Hackers
<b><i>Conference of Mayors Resolution Calls for Cities Not to Pay Ransomware</b></i><p>The underlying logic is pretty straightforward: if bad actors realize that there's no longer any cash waiting for them at the end of the rainbow, they'll eventually pack up their ball and go home.
Features

EU Court Rules Adding Facebook 'Like' Button Triggers GDPR Data Collection Obligation
Websites with embedded Facebook “like” buttons must inform users their data will be collected and processed by the social media giant, the Court of Justice of the European Union has ruled.
Features

Legal Tech: Smart Speakers and E-Discovery
For businesses that own such a device, or for individual employees who might have a personally owned one on their office desk, the question of who owns any recorded data remains murky.
Features

5 Quick and Easy Ways to Hack Your Business Development
The most popular justification for avoiding business-development activities is a lack of time. There are, however, a number of strategies that will allow you to execute and produce results in minutes — or even seconds.
Features

Legal Tech: How E-Discovery Trends Are Reshaping E-Discovery Teams
E-discovery, as an industry, is once again at an inflection point. What are the big trends that are exerting pressure on e-discovery teams today — and more importantly, what will an effective e-discovery team look like in the coming years?
Features

Fourth Quarter Educational Events to Stay on Track
A review of upcoming programs and events that bring together many of the most active professionals in the field and its various branches.
Features

When Key Employees Quit: 5 Things You Must Do to Keep Control of Critical Data
Losing a key employee is never easy — they often take with them institutional knowledge, great internal and external relationships, and critical skill sets. There is also a risk that they'll take some information or data with them when they go, either inadvertently or on purpose.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- When Is a Repair Structural or Nonstructural Under a Commercial Lease?A common question that commercial landlords and tenants face is which of them is responsible for a repair to the subject premises. These disputes often center on whether the repair is "structural" or "nonstructural."Read More ›
- Beach Boys Songs Written Decades Ago Triggered Current Quarrel With LawyersThere's current litigation in the ongoing Beach Boys litigation saga. A lawsuit filed in 2019 against Nevada residents Mike Love and his wife Jacquelyne in the U.S. District Court for the District of Nevada that alleges inaccurate payment by the Loves under the retainer agreement and seeks $84.5 million in damages.Read More ›
- Coverage Issues Stemming from Dry Cleaner Contamination SuitsIn recent years, there has been a growing number of dry cleaners claiming to be "organic," "green," or "eco-friendly." While that may be true with respect to some, many dry cleaners continue to use a cleaning method involving the use of a solvent called perchloroethylene, commonly known as perc. And, there seems to be an increasing number of lawsuits stemming from environmental problems associated with historic dry cleaning operations utilizing this chemical.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Technology in Marketing: Where to Invest Your Marketing Technology DollarsLaw firms have realized that using technology ' particularly the Internet ' is a powerful tool for creating a more level playing field to enhance their images, expand their visibility in targeted markets and drive business to their firms. However, with so many competing interests for limited marketing dollars, where should you invest your firm's resources to get the most bang for the buck?Read More ›