Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Legal Tech: Spring 2019 E-Discovery Case Law Review Image

Legal Tech: Spring 2019 E-Discovery Case Law Review

Mike Hamilton

The amendments to the Federal Rules of Civil Procedure in 2015 intended to clarify some of the ambiguities that caused inconsistent rulings in e-discovery matters. One such amendment was to Rule 37(e), which seemed to indicate that courts would not levee punitive sanctions without establishing “intent to deprive.” Despite this language, though, courts continue rely on their inherent authority to issue sanctions, meaning organizations must take their preservation obligations seriously.

Features

Expanding Your Digital Strategy with RPA Image

Expanding Your Digital Strategy with RPA

Arup Das

Beyond improving efficiency, new advancements in Robotic Process Automation, or RPA, are helping lawyers do more <i>billable</i> work without hiring more people.

Features

2 U.S. Law Firms Among Cybercrime Victims Image

2 U.S. Law Firms Among Cybercrime Victims

Patrick Smith

<b><i>Because They Often Possess Valuable Information on a Variety of Companies and Individuals, Law Offices Continue to Be a Favorite Target for Hackers</b></i><p>The DOJ said that two U.S.-based law firms were among the victims of a “complex transnational organized cyber-crime network” that has been taken down.

Features

EU E-Commerce Proposal Aims to Eliminate Barriers; Calls for E-Signatures and Net Neutrality Image

EU E-Commerce Proposal Aims to Eliminate Barriers; Calls for E-Signatures and Net Neutrality

Simon Taylor

The European Union has put forth an ambitious proposal for how countries can eliminate barriers to e-commerce and protect businesses and consumers engaged in online transactions. But parts of the proposal, published as part of a World Trade Organization initiative that includes the U.S. and China, are likely to face opposition.

Features

Companies Poised To Repeat Data Privacy Compliance Mistakes Image

Companies Poised To Repeat Data Privacy Compliance Mistakes

Phillip Bantz

<b><i>New Study Shows U.S. Companies Are Taking the Same Failed Approach To Complying With California's Privacy Regulation As They Did for GDPR</b></i><p>U.S. companies haven't learned much from the missteps they made while preparing for the European Union's General Data Protection Regulation (GDPR), suggests a new study on data privacy regulation compliance.

Features

State Report: New NJ Data Breach Notification Legislation Signed Image

State Report: New NJ Data Breach Notification Legislation Signed

Suzette Parmley

Legislation expanding the types of personal data that will trigger a required notification to customers in case of a breach, including email addresses and passwords, was signed into law by Gov. Phil Murphy.

Features

State Report: NY Creates Nation's First Regulatory Cybersecurity Division Image

State Report: NY Creates Nation's First Regulatory Cybersecurity Division

Dan M. Clark

New York's financial regulatory agency has created a first-in-the-nation cybersecurity division to place special focus on protecting the state's consumers and industries from digital threats.

Features

Podcast: Cognitive Security Image

Podcast: Cognitive Security

Jason Thomas

We live in information environment that is unique to this point in time (social media, information overload). How do we know what's true and what's not?

Features

The Nice-to-Haves and Need-to-Haves of Cloud Computing Image

The Nice-to-Haves and Need-to-Haves of Cloud Computing

Michael Smith & Mike Paul

This article discusses what to look for in a cloud service provider and other issues that will help determine if moving to the cloud is the right move for your firm.

Features

IP Theft Goes Far Beyond the Huawei Scandal: How to Stay Safe Image

IP Theft Goes Far Beyond the Huawei Scandal: How to Stay Safe

Ilia Sotnikov

IP theft is not limited to kingpins of business. Even if your organization has never appeared in the headlines, you cannot rest easy that no one is interested in acquiring your know-how. In fact, analysis the results of our survey for the 2018 Netwrix IT Risks Report reveals that small and medium organizations are actually more vulnerable to IP theft and cyber espionage than enterprises.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Disconnect Between In-House and Outside Counsel
    'Disconnect Between In-House and Outside Counsel is a continuation of the discussion of client expectations and the disconnect that often occurs. And although the outside attorneys should be pursuing how inside-counsel actually think, inside counsel should make an effort to impart this information without waiting to be asked.
    Read More ›
  • Holders of Unredeemed Gift Cards Denied Bankpruptcy Priority
    For some time now, the brick and mortar side of the retail industry has been in financial distress. In 2015 and 2016 alone, brand-name ­companies such as Sports Authority, RadioShack, Aéropostale, American Apparel, Eastern Mountain Sports and City Sports sought bankruptcy protection. A common question in these cases is how to treat holders of unredeemed gift cards. Are they near the back of the line with other general unsecured creditors, or are they entitled to “priority” payment status under the Bankruptcy Code?
    Read More ›