Features
Anatomy of a Prompt: Real Training for Using AI
With generative AI, research time has collapsed and review time has expanded. The model can draft in minutes, which means you now spend more time asking whether the draft is accurate, defensible, and on brand. Prompting skill is not about magic words. It is about shaping the first draft so the review phase is shorter and you are not fixing preventable mistakes. A good prompt removes ambiguity, narrows scope, and sets expectations. The better the prompt, the less the scramble at the end.
Features
Top 7 Ways Law Firms Can Fortify Their Security and Protect Client Trust
In the minds of your clients, trust and security are intertwined. As stewards of confidential client information, law firms must go beyond minimum compliance, setting a gold standard that safeguards data, builds confidence and differentiates forward-looking practices from the rest. The following seven strategies, drawn from real-world experience in legal technology, outline actionable ways law firms can fortify their defenses while making security a pillar of client trust and firm reputation.
Features
Cyberattacks on U.S. Courts System Affect White-Collar Criminal Clients
The federal judiciary’s electronic case management system, known as CM/ECF, was hacked in large-scale cyberattacks this summer. Although court officials are mum on the possible perpetrators, news reports have said investigators suspect that the hacking could possibly have been perpetrated by Russian state-linked actors. The far-reaching breach has exposed the identities of cooperating witnesses and victims.
Features
A Business Guide to the U.S. AI-Privacy Crossroads
As AI becomes more embedded in everyday life and business operations, companies are facing a growing regulatory maze at the intersection of state privacy laws and emerging AI standards. This article explores the privacy laws that impact the use of AI and automated decision making and offers a practical guide for business leaders that aligns AI innovation with privacy expectations.
Features
Legal Teams Are Leaving Critical Mobile Evidence on the Table
One of the most revealing contradictions in today’s legal landscape is hiding in plain sight. Mobile data now plays a role in more than 75% of e-discovery matters, yet fewer than half of legal teams say they see it in even half of their cases. In an era of encrypted messaging, BYOD policies, and dispersed workforces, this isn’t just an oversight, it’s a liability.
Features
Cloud Migration for E-Discovery and RelativityOne
This is the first article in a two-part series dedicated to examining the evolving landscape of e-discovery for legal professionals. Part One addresses the complex challenges and established best practices associated with migrating e-discovery processes to the cloud, emphasizing perspectives from law firms and legal IT specialists.
Features
Cybersecurity Safe Harbor? There Be Dragons
When we examine where the dragons be in cyber litigation, you’ll start to realize that there are safer, deeper ports in which to anchor. And those are just about every state in the Union and every federal agency that has cybersecurity regulations where “reasonability” is the standard of care.
Features
Beyond Pilots: Smarter Paths to Generative AI in Law Firms
Stop running pilot after pilot with different tools but failing to move beyond testing. Start with business outcomes. Redesign processes and guardrails. Rethink pricing models. And then, with clarity of purpose, choose the tools that enable the future of legal work.
Features
How AI Is Transforming the Buyer Journey: The End of Google, Part One
The end of Google page one is not the end of discovery. It is the beginning of a new discovery model — one where the winners are those who align with how buyers actually search, learn, and decide in the age of AI.
Features
Preserving Business Data When Employees Leave: A Mobile Device Offboarding Checklist
When employees leave, they don’t just walk out the door with their personal belongings, they often take with them valuable institutional knowledge, IP, and other business-critical data. Without proper data retention policies for departing employees, organizations risk losing essential information, exposing themselves to security threats, and facing costly legal consequences.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Law Firm Real Estate Strategy: Attorney Offices Are Out, Conference Rooms Are InLaw firms are navigating a paradigm shift in how they approach office space. With the rise of flexible workplaces, firms are finding that when their attorneys do come into the office, the main goal is to connect and collaborate with peers — and this shift has transformed how law firms address their real estate needs.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The Perfect Storm: Why Contract Hiring Will Eclipse Direct Hiring In Privacy and Tech In 2024Part Two of a Two Part Article Part 1 of this article looked at how remote flexibility is driving job seekers, that most privacy programs will use contractors by 2026, the speed of hire, the real cost of DIY staffing and whether posting jobs online really works. Part 2 looks at what's next for CPOs, AI jobs in privacy, where the new jobs will come from, whose salaries are spiking and some guidance for the latter half of 2024.Read More ›
