Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Legal Tech: Early 2018 E-Discovery Case Law Review: Sanctions and the Reasonableness of TAR Image

Legal Tech: Early 2018 E-Discovery Case Law Review: Sanctions and the Reasonableness of TAR

Mike Hamilton

Cases from early 2018 that stand above many others for the impact they will have on both sanctions and e-discovery review processes moving forward.

Features

What We Learned from ILTACON'18 Image

What We Learned from ILTACON'18

Rhys Dipshan

A wrap-up of the 2018 ILTACON.

Features

Get Ready for California's Version of the EU General Data Protection Regulation Image

Get Ready for California's Version of the EU General Data Protection Regulation

Jacqueline Klosek

The entertainment industry is intensely focused on data collection and analytics as it seeks to maximize the exploitation of digital content. Just as those of us in the privacy field had begun to have a slight breather as much of the heavy lifting on the GDPR was finally behind us, lawmakers in California have passed the California Consumer Privacy Act of 2018 (CCPA).

Features

General Data Protection Regulation: Defense or Offense? Image

General Data Protection Regulation: Defense or Offense?

Nina Cunningham

Ostensibly, GDPR's mission is to strengthen and unify the EU's protection of online privacy rights and promote data protection for citizens of the 28 countries currently in the EU. In the global economy, however, GDPR serves as an alarm to all countries with business flowing across Europe and well beyond. Where business flows, data follow.

Features

Measuring Success in Cybersecurity Image

Measuring Success in Cybersecurity

Chris Moschovitis

Cybersecurity concerns are akin to health concerns. You can practice a healthy lifestyle; you can get regular medical check-ups; you can be vigilant in monitoring your own body. Still, the question remains, “How do I know I'm healthy?” The answer is, “You don't.”

Features

Five Takeaways from Recent Cybersecurity Developments by Colorado and the SEC Image

Five Takeaways from Recent Cybersecurity Developments by Colorado and the SEC

Brian Neil Hoffman

Colorado recently adopted a new law expanding companies' obligations in the event of a cybersecurity incident, and establishing new data security and disposal obligations. Recent announcements by the SEC likewise emphasize important responsive points for both companies and their personnel in the wake of an incident. Five key takeaways from these developments are highlighted in this article.

Features

Protecting Privilege Before and After a Cyber Breach Image

Protecting Privilege Before and After a Cyber Breach

Robert W. Anderson & Eric B. Levine

Critical to any counsel working to prevent a cyber attack or respond to a successful cyber intrusion is an understanding of why and how to properly utilize both attorney-client and work-product privilege.

Features

Is Gmail's New Ephemeral Messaging Service a Threat to Data Retention? Image

Is Gmail's New Ephemeral Messaging Service a Threat to Data Retention?

Rhys Dipshan

Despite some potential problems with widespread use of Gmail's 'confidential mode,' the new ephemeral messaging function can be easily managed from an information governance perspective.

Features

Legal Tech: Approaches and Considerations for Discovery Cost Minimization and Recovery Image

Legal Tech: Approaches and Considerations for Discovery Cost Minimization and Recovery

John Koss & Daniel Pelc

The costs of litigation increase with ever more potentially responsive data, litigation technology options, and a truly global reach in the context of much litigation. In response, law firms must continue to consider viable approaches to broaching discussions surrounding the recovery of these costs both within the firm and, more importantly, with law firm clients.

Features

Pitching Your Cybersecurity Case to Law Enforcement Agencies Image

Pitching Your Cybersecurity Case to Law Enforcement Agencies

Steven A. Cash & Naju R. Lathia

This article focuses on the unique issues that arise in a specific but increasingly common scenario: when your client is the victim of a cybercrime.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Risks of “Baseball Arbitration” in Resolving Real Estate Disputes
    “Baseball arbitration” refers to the process used in Major League Baseball in which if an eligible player's representative and the club ownership cannot reach a compensation agreement through negotiation, each party enters a final submission and during a formal hearing each side — player and management — presents its case and then the designated panel of arbitrators chooses one of the salary bids with no other result being allowed. This method has become increasingly popular even beyond the sport of baseball.
    Read More ›
  • Private Equity Valuation: A Significant Decision
    Insiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.
    Read More ›
  • Bankruptcy Sales: Finding a Diamond In the Rough
    There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
    Read More ›