Features

Introducing the Cybersecurity Reference Model
When EDRM and CSRM Collide, Much Is Illuminated About the Hiring Trends in Both e-Discovery and Cybersecurity
Features

Sixth Circuit's Decision on Privacy Claims over Data Breaches
Data breaches such as the one Yahoo recently revealed (500 million accounts!) get the big headlines. In response, large companies double down on their efforts to protect the security of their data. But small to midsize businesses often fail to appreciate the risk of a data breach to their own business.
Features

2016: The Year Everything Changed In Social Media Marketing
Three megatrends culminated in online business development in 2016, requiring attorneys to change their digital marketing tactics and to re-focus on what produces results.
Features

Increase of IP Cyberthefts on the Horizon, and Many Unprepared
Though cybertheft of intellectual property is predicted to dramatically increase over the next 12 months, a significant portion of companies has yet to fully secure their IP assets, according to a survey released by Deloitte Cyber Risk Services.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Beach Boys Songs Written Decades Ago Triggered Current Quarrel With LawyersThere's current litigation in the ongoing Beach Boys litigation saga. A lawsuit filed in 2019 against Nevada residents Mike Love and his wife Jacquelyne in the U.S. District Court for the District of Nevada that alleges inaccurate payment by the Loves under the retainer agreement and seeks $84.5 million in damages.Read More ›
- Issue-Specific Withdrawal of the ReferenceThis article considers the genesis, tendency and scope of the district courts' withdrawals of the reference in some of the more complex proceedings pending today.Read More ›
- Transfer Tax Implications on Real Property LeasesThe real property transfer tax does not apply to all leases, and understanding the tax rules of the applicable jurisdiction can allow parties to plan ahead to avoid unnecessary tax liability.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Settlement Privilege and the Threat of Legal ActionPart One of this article considers the issue of when a threat to litigate encased by a settlement demand raises the specter of extortion, and the extent to which a potentially extortionate settlement communication should be outside the scope of the privilege.Read More ›