Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Client Document Security Audits: Is Your Law Firm Ready? Image

Client Document Security Audits: Is Your Law Firm Ready?

Alvin Tedjamulia

It is essential for all law firms to safeguard their clients' documents against ever-evolving threats and thoroughly understand the security challenges and potential solutions in today's demanding world of legal document compliance.

Features

Looking to the FFIEC Revised Information Security Booklet for Best Practices in Data Security for Financial Institutions Image

Looking to the FFIEC Revised Information Security Booklet for Best Practices in Data Security for Financial Institutions

Craig Nazzaro

The Federal Financial Institutions Examination Council (FFIEC) recently revised its Information Security Booklet. The changes bring the financial services industry closer to the goal of having a clearly defined set of cybersecurity and data protection protocols to ensure regulatory compliance.

Features

Legal Tech: e-Discovery: Judge Says 'NO' to Party's Bid to Force Use of Predictive Coding Image

Legal Tech: e-Discovery: Judge Says 'NO' to Party's Bid to Force Use of Predictive Coding

By H. Christopher Boehning & Daniel J. Toal

Would Judge Peck's admiration and advocacy for predictive coding lead him, upon a request by the opposing party, to force a responding party to use it against that party's own wishes? Judge Peck recently faced this issue, putting potential use of predictive coding at odds with established precedent and procedure regarding how to conduct discovery.

Columns & Departments

Movers & Shakers

ssalkin & Law Journal Newsletters

Movers & Shakers Law firm Venable recently announced the addition of former AOL Inc. chief counsel, Charles D. Curran, as a partner in…

Features

Introducing the Cybersecurity Reference Model Image

Introducing the Cybersecurity Reference Model

Jared Coseglia

When EDRM and CSRM Collide, Much Is Illuminated About the Hiring Trends in Both e-Discovery and Cybersecurity

Features

Sixth Circuit's Decision on Privacy Claims over Data Breaches Image

Sixth Circuit's Decision on Privacy Claims over Data Breaches

By Shari Claire Lewis

Data breaches such as the one Yahoo recently revealed (500 million accounts!) get the big headlines. In response, large companies double down on their efforts to protect the security of their data. But small to midsize businesses often fail to appreciate the risk of a data breach to their own business.

Features

2016: The Year Everything Changed In Social Media Marketing Image

2016: The Year Everything Changed In Social Media Marketing

By Larry Bodine

Three megatrends culminated in online business development in 2016, requiring attorneys to change their digital marketing tactics and to re-focus on what produces results.

Features

Increase of IP Cyberthefts on the Horizon, and Many Unprepared Image

Increase of IP Cyberthefts on the Horizon, and Many Unprepared

Ricci Dipshan

Though cybertheft of intellectual property is predicted to dramatically increase over the next 12 months, a significant portion of companies has yet to fully secure their IP assets, according to a survey released by Deloitte Cyber Risk Services.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Bankruptcy Sales: Finding a Diamond In the Rough
    There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
    Read More ›
  • Supreme Court Asked to Assess Per Se Rule Tension in Criminal Antitrust
    In recent years, practitioners have observed a tension between criminal enforcement of the broadly written terms of the Sherman Antitrust Act of 1890 and the modern Supreme Court's notions of statutory interpretation and due process in the criminal law context. A certiorari petition filed in late August in Sanchez et al. v. United States, asks the Supreme Court to address this tension, as embodied in the judge-made per se rule.
    Read More ›
  • Restrictive Covenants Meet the Telecommunications Act of 1996
    Congress enacted the Telecommunications Act of 1996 to encourage development of telecommunications technologies, and in particular, to facilitate growth of the wireless telephone industry. The statute's provisions on pre-emption of state and local regulation have been frequently litigated. Last month, however, the Court of Appeals, in <i>Chambers v. Old Stone Hill Road Associates (see infra<i>, p. 7) faced an issue of first impression: Can neighboring landowners invoke private restrictive covenants to prevent construction of a cellular telephone tower? The court upheld the restrictive covenants, recognizing that the federal statute was designed to reduce state and local regulation of cell phone facilities, not to alter rights created by private agreement.
    Read More ›