Features
Harnessing AI for Efficiency and Growth
While AI presents valuable opportunities, the excitement around it can sometimes overshadow the need for proper data management and interpretation. Here's a balanced look at how AI can be used to drive efficiency and growth within your firm, along with some key considerations.
Features
Legislative Protections Against AI Voice Scams
A wide range of tools have been developed to perform vocal cloning, leading to vocal deepfakes becoming a common source of scams and misinformation. And these issues have only been exacerbated by a lack of appropriate laws and regulations to rein in the use of AI and protect an individual's right to their voice.
Features
Midlevel Associates Frustrated By Firms' Lack of Tech-Savviness
In this year's Midlevel Associate Tech Survey, a number of associates at top firms once again said they were frustrated by their firms' lack of tech savviness and willingness to upgrade equipment. This echoes complaints from last year, and it should be noted that the survey regularly elicits similar criticisms about some of the world's richest law firms' technology.
Features
LJN Quarterly Update: 2024 Q3
The LJN Quarterly Update highlights some of the articles from the nine LJN Newsletters titles over the quarter. Articles include in-depth analysis and insights from lawyers and other practice area experts.
Features
Hyperlinked Documents: The Latest e-Discovery Challenge
As courts and discovery experts debate whether hyperlinked content should be treated the same as traditional attachments, legal practitioners are grappling with the technical and legal complexities of collecting, analyzing and reviewing these documents in real-world cases.
Features
Risks and Ad Fraud Protection In Digital Advertising
The ever-evolving digital marketing landscape, coupled with the industry-wide adoption of programmatic advertising, poses a significant threat to the effectiveness and integrity of digital advertising campaigns. This article explores various risks to digital advertising from pixel stuffing and ad stacking to domain spoofing and bots. It will also explore what should be done to ensure ad fraud protection and improve effectiveness.
Features
The Fourth Amendment and ESI
Courts have long acknowledged that searches of computers and other mediums storing electronic information (ESI) often involve a degree of intrusiveness much greater in quantity and in kind from searches of other containers. This article reviews some recent case law that spotlights this ever developing area of the law.
Features
The Benefits of Blockchain for e-Discovery and Data Preservation
As businesses across various industries increasingly adopt blockchain, it will become a critical source of discoverable electronically stored information. The potential benefits of blockchain for e-discovery and data preservation are substantial, making it an area of growing interest and importance.
Features
Phase 2 of PA's Insurance Data Security Law Is Coming — Record of Compliance Required
In 2023, Pennsylvania joined the growing number of states enacting the National Association of Insurance Commissioners' (NAIC) Model Law on Insurance Data Security. On Dec. 11, 2024 (just four months away), the second phase of the law goes into effect, which requires licensees to undertake detailed risk assessments, design and implement comprehensive and written cybersecurity programs, and, for some organizations, publicly certify compliance with the law.
Features
Legal Remedies Against Revenge Porn
Instant access to the internet has made sharing photographs online easy. Unfortunately, this has opened the door to revenge porn. Revenge porn is a serious violation of privacy that can have devastating consequences for victims. How might a victim of revenge porn counteract posts of compromising photographs to social media?
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Disney-OpenAI’s Sora Deal: What it Signals for Licensing and Responsible AIThe Walt Disney Co.’s newly announced, three-year licensing agreement with OpenAI to bring more than 200 characters from Disney, Marvel, Pixar and Star Wars to Sora marks a pivotal moment at the intersection of intellectual property and generative AI. For rights holders, platforms, and brands, the deal illustrates an emerging blueprint for commercializing iconic IP in AI-native formats while attempting to manage legal, regulatory, and reputational risk.Read More ›
