Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Cybersecurity and Email Image

Cybersecurity and Email

Bill Ho

In the legal community, professionals have embraced email. However, as increasing concerns and regulations around data security continue to evolve, the future of digital communication via email may not meet the more stringent requirements.

Features

Fighting Biometric Fraud on the Blockchain Image

Fighting Biometric Fraud on the Blockchain

Alastair Johnson

The use of SMS verification codes as a security measure has recently been exposed as a mere stop-gap solution because of the ability of hackers to fraudulently take over phone numbers. Biometrics meanwhile is proving to be one of the best new technologies to combat fraud and identity theft.

Features

Law Firms: You Can't Buy Yourself Out of Risk Image

Law Firms: You Can't Buy Yourself Out of Risk

Mark Sangster

A survey of more than 160 law firm executives (from medium to large firms) found that law firms are among some of the highest spenders on security yet were susceptible to some of the most common risks. And the issue will grow over the coming years as the demands of the business drive the adoption of emerging technologies, such as cloud and Artificial Intelligence (AI).

Features

Law Firms at a Crossroads: The New Paths to Safeguarding Data as Attacks Ramp Up Image

Law Firms at a Crossroads: The New Paths to Safeguarding Data as Attacks Ramp Up

Brian Lapidus & Keith Wojcieszek

How do you protect your firm? The vast majority of cyber-related vulnerabilities can be traced to staff and third parties who accidentally or deliberately don't follow security protocols or are tricked into downloading malicious code.

Features

Retail Leads the Way in Data Breaches — Here's How to Protect Your Customers Image

Retail Leads the Way in Data Breaches — Here's How to Protect Your Customers

Paige Schaffer

If 2017 was considered the “year of the data breach” as the number of incidents hit a new record high of 1,579, 2018 might get even more serious. Just a little more than halfway through 2018, the number and scale of data breaches that have already been reported is staggering.

Features

Cybersecurity Roundtable: Chicago's Tech Experts Answer Three Critical Cybersecurity Questions Image

Cybersecurity Roundtable: Chicago's Tech Experts Answer Three Critical Cybersecurity Questions

Adam Schlagman

Earlier this summer a group of security-minded executives in Chicago, long a hub for legal and financial tech, sat down for a panel discussion on anticipating and combatting cybercrime.

Features

Law Firms: You Can't Buy Yourself Out Of Risk Image

Law Firms: You Can't Buy Yourself Out Of Risk

Mark Sangster

A survey of more than 160 law firm executives (from medium to large firms) found that law firms are among some of the highest spenders on security yet were susceptible to some of the most common risks. And the issue will grow over the coming years as the demands of the business drive the adoption of emerging technologies, such as cloud and Artificial Intelligence (AI).

Features

Securing Each Link in the e-Discovery Chain Image

Securing Each Link in the e-Discovery Chain

David A. Greetham

Cloud service providers to the federal government must meet the rigorous requirements of the Federal Risk and Authorization Management Program. FedRAMP, as it's known, is designed to help federal agencies follow the government's “cloud first” policy, and includes detailed and strict encryption and other cybersecurity requirements.

Features

Blockchain Will Bring Opportunities, Challenges to Legal Discovery Image

Blockchain Will Bring Opportunities, Challenges to Legal Discovery

Adam Brill

As more and more data is in blockchains, attorneys will have to interact with it. Blockchain will also become part of litigation without being the central focus as systems move to blockchain implementation. Attorneys will have to take note.

Features

Legal Tech: Early 2018 E-Discovery Case Law Review: Sanctions and the Reasonableness of TAR Image

Legal Tech: Early 2018 E-Discovery Case Law Review: Sanctions and the Reasonableness of TAR

Mike Hamilton

Cases from early 2018 that stand above many others for the impact they will have on both sanctions and e-discovery review processes moving forward.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The 'Sophisticated Insured' Defense
    A majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.
    Read More ›
  • Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric Code
    In an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.
    Read More ›