Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

6 Risks Affecting Cybersecurity for Law Firms Image

6 Risks Affecting Cybersecurity for Law Firms

Chris Mangano & Edward Keck, Jr.

We are all "custodians of data." Law firms specifically are stewards of some of the most sensitive information stored and shared; a fact that doesn't elude nefarious cybercriminal syndicates. Below are some of the top cybersecurity risks affecting law firms.

Features

Redefining Attorney-Client Collaboration with Technology That Delivers Greater Value Image

Redefining Attorney-Client Collaboration with Technology That Delivers Greater Value

David Carns

If savvy law firm attorneys haven't done so yet, they should take this time to adjust their expectations and increase their comfort levels with new technologies, processes, and workflows. Going forward, their clients will expect the emphasis to be on relationships and outcomes, not billable hours.

Features

Cloud-Based Discovery Is at Critical Mass: Here's Why Image

Cloud-Based Discovery Is at Critical Mass: Here's Why

Kenneth Spencer

Part One of a Two-Part Series The legal industry today is experiencing a massive uptick in cloud-based discovery. The shift to remote and hybrid work and changing attitudes toward the cloud are significant factors in the movement to widespread adoption of cloud-based discovery. This article explains the momentum behind the rise of cloud-based discovery and the business reasons why companies will have to embrace it.

Features

The Changing Face of Incident Response Image

The Changing Face of Incident Response

Larry Gagnon

A good incident response program helps firms affected by a cyberattack identify potential damage to their reputation, their regulatory obligations for reporting and issuing notifications, and the potential for future litigation.

Features

Cyber Insurance Experiencing Future Shock Image

Cyber Insurance Experiencing Future Shock

Barry M. Miller & Elisabeth Gentile

Insurers who write cyber liability policies are well-equipped to manage cyber claims, but what about carriers and adjusters who face such claims under more traditional policies — also known as "Silent Cyber?" This article aims to help non-cyber risk adjusters who may have to oversee such a claim.

Features

7 Keys to Managing Tech and Service Company Partnerships Image

7 Keys to Managing Tech and Service Company Partnerships

David Cochran

Partnerships play a key role in today's legal marketplace. Typically, one supplier partners with a law firm and/or corporate legal department to provide…

Features

California 'Right to Know Act' Sets Off Alarm Bells Ring for Privacy Experts Image

California 'Right to Know Act' Sets Off Alarm Bells Ring for Privacy Experts

Isha Marathe

While state data privacy legislation is picking up across the U.S., a California bill that recently passed the State Senate and has remained largely under the radar, has some privacy experts raising alarm bells.

Features

Legal Tech: Can Claiming Incompetence Save You from Spoliation Sanctions? Image

Legal Tech: Can Claiming Incompetence Save You from Spoliation Sanctions?

Eric P. Mandel

A recent opinion in Illinois raises the question of whether spoliating parties should be encouraged to present the following defense at trial: "Ladies and gentlemen of the jury, yes the main evidence of this case has been destroyed, but it's only because my client and my law firm are completely incompetent when it comes to preserving electronic evidence."

Features

Enforcement Update: U.S. Courts Demonstrate Reluctance to Extend Application of Chinese Data Security and Privacy Laws In Civil Discovery Image

Enforcement Update: U.S. Courts Demonstrate Reluctance to Extend Application of Chinese Data Security and Privacy Laws In Civil Discovery

Jeff Pade & Lindsey Dieselman

Two recent Chinese laws — the Data Security Law (DSL) and the Personal Information Protection Law (PIPL) — include provisions aimed at restricting the cross-border transfer of China-based data foreign enforcement and judicial authorities. U.S. courts have not yet addressed whether these data protection and privacy laws could bar the production of documents in civil contexts involving governmental litigants or in criminal proceedings.

Features

Mitigating Risks at Professional Service Firms Using Artificial Intelligence Image

Mitigating Risks at Professional Service Firms Using Artificial Intelligence

Brian P. Piatek

Truly malicious internal threats can often be treated much like external threats using the tools and backups already in place. But how does a firm proactively identify the softer threats — which may be just as dangerous as the malicious threats and can cripple a firm just as effectively?

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Legal Possession: What Does It Mean?
    Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Cutting Off the Stream: How United States v. Silver Affects "Stream of Benefits" or "Retainer" Bribery
    Although the court stressed that, by vacating certain of former NY State Assembly Speaker Sheldon Silver's counts of conviction, it was clarifying and not altering the "as opportunities arise" theory, it nevertheless emphasized that this theory requires particularity with respect to the "question or matter" that is the subject of the bribe payor and recipient's corrupt agreement.
    Read More ›