Features

What's the Deal with WhatsApp: Investigating and Discovering Mobile Device Data?
Analyzing data from mobile devices is still uncharted territory for many in Legal and IT. Accordingly, today's modern legal and technology professionals need to brush up on all things mobile. This includes understanding where applicable data resides in a mobile device and what common challenges are associated with accessing, preserving and extracting this data.
Features

Are 'Smart Contracts' Smart Enough?
<b><i>Certain Legal Functions Can Be Automated with the Use of Blockchains</b></i><p>The automation of certain attorney functions has given rise to a new form of contracting, known as "smart contracts." Consequently, a decrease in the demand for certain attorney functions that can now be performed by Internet applications is matched by an increase in demand for legal advisers who can prepare smart contracts and ensure these smart contracts accurately reflect a desired business transaction.
Features

The Future Is Now: Global Litigation, Digital Workflows and Electronic Proceedings
Welcome to the new world of digital litigation, which is rapidly emerging in the context of an increasingly globalized world — a world where it is now commonplace for domestic law firms to extend their reach across international borders, engage in legal matters that span multiple jurisdictions, and collaborate with overseas colleagues and foreign counsel on a regular basis.
Features

Dark Web Marketplace Takedowns Mitigate Legal's Cyberthreat, But Only So Much
The recent takedown of dark web marketplace AlphaBay represented a major success for law enforcement agencies in the U.S. and around the world. However, experts caution that its effect on mitigating the overall level of cyberthreat faced by corporations and law firms alike, while significant, will likely be temporary at best.
Features

D.C. Circuit Reverses Dismissal of Case over Cyberattack, Finding Possible Harm in Data Loss
Calling for a broader view of standing, a federal appeals court in Washington, DC, has reversed the dismissal of a case brought over the 2014 cyberattack of health insurer CareFirst.
Features

Cyber Crime Now Targeting Law Firms
Cyber attacks and theft are on the rise around the country, and law firms are becoming prime targets. Unlike manufacturers, banks and retailers, law firms are unique organizations that are highly vulnerable.
Features

<i>Online Extra</i><br>Trump Cybersecurity Council Resignations Could Mean Disruption for Cybersecurity Policy
The departure of eight members of the council could signal a strained relationship between the business sector and the government around cybersecurity policy.
Features

<b><i>Online Extra</b></i><br> Law Firms, Legal Departments Predicted to Focus More on IT Risk
Overall global spending in the information security services and products sector will total $86.4 billion this year, an increase of 7% over last year.
Features

Cybersecurity Regulation of Financial Services Firms
Financial services firms and their management should keep a close eye on developing cybersecurity regulations, so as to be better prepared to proactively address the shifting regulatory landscape as it continues to evolve.
Features

DLA Piper's Hack Attack Could Cost 'Millions'
At press time, DLA Piper was still recovering from its massive cyberattack, with insurance brokers claiming that the resulting upheaval could lead to costs "in the millions" for the firm.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Clause & EffectNet-Profit Rights/Movies Based on TV Shows<br>Insurance/Contract-Breach Exclusion<br>Insurance/Copyright-Infringement CoverageRead More ›
- Rights and Obligations In Patent LicensesThe owner of a commercially successful patent may have competing desires. On one hand, the patent owner wants to protect the patent and secure its maximum benefit; on the other hand, the patent owner wants to avoid enforcement litigation with competitors because it is expensive and puts the patent at risk.Read More ›
- Foreseeability as a Bar to Proof of Patent InfringementThe doctrine of equivalents is a rule of equity adopted more than 150 years ago by the U.S. Supreme Court. Prosecution history estoppel is a rule of equity that controls access to the doctrine. In May 2002, the Court was called upon to revisit the doctrine and the estoppel rule in <i>Festo Corp. v. Shoketsu Kinzoku Kogyo Kabushiki Co. Ltd.</i> Ultimately the Court reaffirmed the doctrine and expanded the estoppel rule, but not without inciting heated debate over the Court's rationale — especially since it included a new and controversial foreseeability test in its analysis for estoppel.Read More ›