Features

<b><i>Legal Tech</b></i><br> Taking e-Discovery to the Cloud Is the Smart Security Solution
The cloud might seem like “someone else's servers,” but major vendors are sensitive to the business need for security, availability and confidentiality. With sensitive, high-value data like that, cloud providers are keenly aware they need to get security right.
Features

WannaCry Attack Is a Wakeup Call for Cyber Preparedness
Until May 12, 2017, the more highly publicized ransomware incidents were localized targets impacting only one or a small number of businesses. WannaCry made it clear that ransomware could reach a broad cross-section of computers worldwide, at essentially the same time. There are very few, if any, businesses that can safely say they are not targets for cyber-criminals, because at the very least, businesses have personnel records for their employees.
Features

Ransomware Attack on DLA Piper Puts Law Firms, Clients on Red Alert
The ransomware attack on June 27 on DLA Piper sounded an alarm for Big Law. The world's biggest firms are just as prone to ransomware attacks as any other company, and the potential ramifications of a network-crippling malware infection are wide-ranging for a service industry that holds the legal fate of corporations in its palm.
Features

Managing Cyber Risks in Medical Practices
<b><I>Part One of a Two-Part Article</I></b><p>We often associate cyber-risks with financial institutions, but while the financial sector certainly does deal with cyber-risks, it is by no means the only industry facing such woes. Health care providers are also vulnerable to cyber-liability risks.
Features

Cybersecurity After WannaCry
Following the May 2017 WannaCry ransomware infiltration into over 10,000 organizations and individuals in over 150 countries, it is clear that businesses across industries have no choice but to spend time and resources digesting and culling through the cybersecurity information barrage.
Features

Ransomware Attack on DLA Piper Puts Law Firms, Clients on Red Alert
By now, every managing partner has heard the warning: Law firms and their clients' sensitive information are a treasure trove for hackers.But the ransomware…
Features

Are Your Post-Breach Forensic Reports Privileged?
<b><i>A Trend Is Emerging</b></i><p>The Central District of California recently joined the small growing list of courts that have held forensic reports created by outside security companies following a data breach are protected from disclosure in civil litigation in certain circumstances.
Features

WannaCry Attack Is A Wake-Up Call for Cyber Preparedness
The scope of WannaCry changed our perceptions of ransomware attacks. It made it clear that ransomware could reach a broad cross-section of computers worldwide, at essentially the same time.
Features

Asserting Damages for Data Piracy Under the CFAA
When a database is breached in one way or another, the results can be devastating. Many companies suffering this kind of loss turn to litigation, often under the Computer Fraud and Abuse Act, which prohibits improperly accessing a protected computer. There is, however, a growing consensus in the Second Circuit that recovery of certain forms of damages under the CFAA simply is not permitted.
Features

3 Steps to Ensuring Your AI Initiative Does Not Fail
The energy in the legal industry surrounding artificial intelligence (AI) is undeniable. Law firms are investing in innovation or undertaking experiments to test the viability of applying AI-enabled tools to various disciplines. Legal professionals are packing presentations to learn if, how and when the heralded disruption will impact their careers.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- The Brave New World of Cybersecurity Due Diligence in Mergers and Acquisitions: Pitfalls and OpportunitiesLike poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.Read More ›
- The 'Sophisticated Insured' DefenseA majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- The New York Uniform Commercial Code Comes of AgeParties in large non-consumer transactions with no connection whatsoever to New York often choose its law to govern their transactions, and New York statutes permit them to do so. What most people do not know is that the New York Uniform Commercial Code is outdated.Read More ›