Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

The Meaning of the 'War Exclusion Clauses' In Cyberinsurance Image

The Meaning of the 'War Exclusion Clauses' In Cyberinsurance

Isha Marathe

The Eastern European conflict is already adding stress to already strained domestic relationships in the U.S. — between businesses and cyber insurance companies. As businesses face more cyberthreats than ever before, many are seeing higher premiums. Meanwhile, insurance companies are looking for ways to skirt coverage obligations that end up proving far too expensive

Features

Legal Tech: Duty to Preserve ESI of Hybrid-Driven Collaborative Tools Image

Legal Tech: Duty to Preserve ESI of Hybrid-Driven Collaborative Tools

Kimbrilee M. Weber & Julien M. Baumrin

With heightened ease of use and convenience comes a duty for businesses and organizations to employ best practices regarding their responsibilities in maintaining the electronically stored information (ESI) that these applications create.

Features

Avoid Making Tech Decisions In Crisis Mode Image

Avoid Making Tech Decisions In Crisis Mode

Tomas Suros

Some law firms are realizing that the hasty, though necessary, decisions made to facilitate remote work should be revisited or undone. Many of the tools implemented in an emergency are insufficient to withstand the increasing cybersecurity threats law firms are facing today. The good news, though, is that it's not too late to implement the right tech to protect your firm.

Features

Why Collaborate: The Future of Legal Services Is Human Image

Why Collaborate: The Future of Legal Services Is Human

Joey Seeber

It is no surprise that in this environment many lawyers are prioritizing qualitative factors, such as work-life balance and feeling appreciated and recognized at work, rather than compensation alone when choosing where to work. Why is it no surprise? Because many of their employers began valuing quality over quantity with their ALSPs years ago. And this shift might do even more for your organization.

Features

A Compliance Briefing for Privacy Officers on the New Canadian Consumer Privacy Protection Act Image

A Compliance Briefing for Privacy Officers on the New Canadian Consumer Privacy Protection Act

John Beardwood & Shan Arora

Part Two In a Series Part One of this series introduced the history of Canada's recently introduced Consumer Privacy Protection Act and reviewed the similarities with GDPR, such as data portability, the right not be forgotten, codes of practice, and a safe harbor provision. Part Two analyzes the new compliance requirement of valid consent.

Features

New Technologies Make for a Shifting Definition of 'Technical Competence' Image

New Technologies Make for a Shifting Definition of 'Technical Competence'

Tinamarie Feil

While new and/or improving technologies may be challenging, they likely also present new opportunities which can facilitate delivering the best services at the best cost. Some solutions can be handled directly by law firms — but others will require the courts to approve, and, perhaps, even change of procedures to get with the times.

Features

Franchisors and Franchisees Make for Easy Cyber Targets Image

Franchisors and Franchisees Make for Easy Cyber Targets

Marc Lieberstein & Raymond Aghaian

We are increasingly hearing about security breaches, data leaks and other kind of data theft in the franchise world. This is because frequently the franchise systems operate as a connected mass of franchisees all of whom collect, store and transmit a diverse array of consumer and personal data to the franchisor. In other words, franchisors and franchisee make a nice easy target for cyber theft.

Features

Jurisdictional License Requirements and Disparate Laws Are Hindering Law Firms' Fight Against Cybercrime Image

Jurisdictional License Requirements and Disparate Laws Are Hindering Law Firms' Fight Against Cybercrime

Isha Marathe

Some cybersecurity experts think the structure of law in the U.S. itself means that truly fighting against growing threat actors is a losing game. Take, for example, the fact that attorneys are largely limited by jurisdictional licensure requirements. While on the other hand, bad actors are often organized, unsaddled by jurisdictional challenges, and able to function as a large decentralized group.

Features

Will Other States Follow NY's Lead on Requiring Cybersecurity CLE? Image

Will Other States Follow NY's Lead on Requiring Cybersecurity CLE?

Cassandre Coyer

New York has become the first state to add a requirement mandating that lawyers take legal education courses in cybersecurity, privacy and data protection. As cyberthreats will likely continue to both grow and evolve in sophistication, attorneys expect this requirement to be only a first step, with more states likely to soon follow.

Features

Text Messages In E-Discovery Image

Text Messages In E-Discovery

David Horrigan

This article looks beyond conspiracy theories and Secret Service slip-ups — or subterfuge, depending on one's perspective — to take a look at the law and technology of texts in e-discovery.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Legal Possession: What Does It Mean?
    Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›