Features

<i>Legal Tech:</i>Looking Ahead: 2018 Legal Technology Predictions
At law firms and legal departments, preparing for the new year should mean looking back at the last year and prioritizing revenue-driving activities, identifying strategies to grow your firm or company while mitigating risk and budgeting for new projects to meet client demands.
Features

Ransomware: What to Do When It Happens to You
In the event that your company is the victim of a ransomware attack, this article provides steps to be taken as part of its response to such an incident. It is meant to be a helpful guide, but the best response generally will depend on different factors, including the scope and severity of the attack, availability of remediation measures, and business sensitivities.
Features

<i>Legal Tech:</i>What an Attorney Can Learn from Legal Tech Marketing Professionals
Some key takeaways and hot topics that should be on the radar of lawyers from the Legal Marketing Association's Legal Marketing Technology Conference in Chicago.
Features

SEC's New Cyber Unit Moves to Tackle 'Scam' Coin Offering
<b><i>In the First Enforcement Action Initiated By Its New “Cyber Unit,” the SEC Announced It Has Secured a Court Order to Freeze the Assets of Individuals Behind a “Scam” Initial Coin Offering</b></i><p>In the first enforcement action initiated by its new “Cyber Unit,” the Securities and Exchange Commission (SEC) recently announced it has secured a court order to freeze the assets of individuals behind a “scam” initial coin offering, or ICO.
Features

In an Era of Crises and Controversies, How Ready Is Your Law Firm?
Although the current news cycle is a barrage of negative situations, the silver lining is that they offer law firms a wealth of teachable moments about the importance of preparing for and responding to a crisis situation.
Features

The Cyber Shot Across the Bow: Data Manipulation and GPS Spoofing
In September 2015, then-Director of National Intelligence James Clapper warned that the next "push of the envelope" in cybersecurity might be attacks that change or manipulate electronic information in order to compromise its accuracy or reliability. Two years later, we may now be seeing the beginning of such insidious attacks, in the context of GPS spoofing — a technique that sends false signals to systems that use GPS signals for navigation.
Features

Regulators Are Catching Up to Cryptocurrency and Blockchain Technology within the Financial Services Industry
<b><i>Part One of a Two-Part Article</b></i><p>As we head into 2018, cryptocurrency and blockchain will continue to be a top initiative for pioneers in the financial services industry. As with any innovation within the financial services industry, the regulators are never far behind and are doing their best to keep up. Those that enter this space will find that they also have to pioneer the controls to manage the regulatory risks this technology presents.
Features

Five Smart Steps to Prepare for GDPR Data Subject Rights
Many corporations around the globe are preparing for May 2018, when Europe's General Data Protection Regulation (GDPR) enforcement kicks in. The regulation encompasses a wide range of nuanced privacy requirements that can be challenging to operationalize. In particular, requirements around the rights of European data subjects — which include the right to be forgotten and rights to access, rectification and objection to processing — will be some of the most difficult to address.
Features

Artificial Intelligence: Knowing When It's Right for Your Firm
Gone are the days when being the best lawyer was enough to guarantee landing and retaining clients. Clients are demanding that firms incorporate automation and increase their efficiency. Clients are relying on automation to streamline the work they outsource, and they expect their law firms to follow suit. To this end and to remain competitive, law firms need to offer their clients innovative solutions and build artificial intelligence (AI) into the core fabric of their practices.
Features

NY AG Proposes Stricter Data Security Laws Citing Equifax Breach
Following the Equifax Inc. breach that compromised personal information of 145.5 million Americans including more than 8 million New Yorkers, Attorney General Eric Schneiderman is proposing comprehensive legislation to tighten data security laws
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Coverage Issues Stemming from Dry Cleaner Contamination SuitsIn recent years, there has been a growing number of dry cleaners claiming to be "organic," "green," or "eco-friendly." While that may be true with respect to some, many dry cleaners continue to use a cleaning method involving the use of a solvent called perchloroethylene, commonly known as perc. And, there seems to be an increasing number of lawsuits stemming from environmental problems associated with historic dry cleaning operations utilizing this chemical.Read More ›
- The Bankruptcy Code's Anti-Discrimination Section and COVID-19The pandemic has spurred analysis of legal issues as businesses grapple with their respective relationships with both private and public entities. In this article, the authors examine Section 525 of the Bankruptcy Code — the anti-discrimination section, and its implications during COVID-19.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Cutting Off the Stream: How United States v. Silver Affects "Stream of Benefits" or "Retainer" BriberyAlthough the court stressed that, by vacating certain of former NY State Assembly Speaker Sheldon Silver's counts of conviction, it was clarifying and not altering the "as opportunities arise" theory, it nevertheless emphasized that this theory requires particularity with respect to the "question or matter" that is the subject of the bribe payor and recipient's corrupt agreement.Read More ›