Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Legal Tech: The Secret Life of E-Discovery Funding Image

Legal Tech: The Secret Life of E-Discovery Funding

Victoria Hudgins

The true extent of funding amounts fueling legal tech and e-discovery software companies will likely never be widely shared. The reason is simple: Without regulatory requirements, the competitive risks of disclosing these investments regularly outweighs any potential benefits.

Features

What Makes Forensic Reports Different? Image

What Makes Forensic Reports Different?

David P. Saunders

Why Are Courts Breaking the Rules and What Are the Unintended Consequences? A lesson learned by young lawyers everywhere is that internal, corporate investigations can be, and frequently are, privileged. However, it is difficult to square that concept with the recent spate of federal court opinions that have concluded that cybersecurity forensic reports generally are not privileged.

Features

Electronic Discovery Document Review: The Power of Feedback Image

Electronic Discovery Document Review: The Power of Feedback

Maggie Burtoft 

Human review of documents will continue to play a huge part in the ediscovery process. Managing reviewer training and accuracy can make or break the budget for your matter.

Features

Competing by Connecting: In an Increasingly Crowded Market, Litigation Teams Must Leverage Centralized Technologies to Rise Above Their Rivals Image

Competing by Connecting: In an Increasingly Crowded Market, Litigation Teams Must Leverage Centralized Technologies to Rise Above Their Rivals

Don Fuchs

Regardless of where each law firm currently stands in its innovation journey, it is crystal clear that the need to speed up the modernization of their technology solutions that facilitate connectivity, automation and workflow between their staff is real and immediate.

Features

Mobile Devices Can Provide Lucrative Back Door Into Businesses for Cyber Thieves Image

Mobile Devices Can Provide Lucrative Back Door Into Businesses for Cyber Thieves

Tim Dinsmore

We live with the reality that the once ordinary communication tool is now a potent device that needs to be used responsibly on the basis that there is a cybercriminal fraternity hell-bent on accessing said devices for ill-gotten gain.

Features

Hybrid Work Environments Add to Internal Cybersecurity Risk Image

Hybrid Work Environments Add to Internal Cybersecurity Risk

Rhys Dipshan

Are law firms truly prepared for evolving threats on the horizon, especially with hybrid work arrangements gaining momentum?

Features

9th Circuit: Police Violated Google Users' Privacy Rights After Automated Email Scan Detected Child Pornography Image

9th Circuit: Police Violated Google Users' Privacy Rights After Automated Email Scan Detected Child Pornography

Alaina Lancaster

A federal appeals court found that law enforcement violated a Google user's constitutional rights when it opened email attachments the platform flagged as child pornography through an automated system.

Features

Flat Fee or Consumption-Based E-Discovery Pricing? Depends on Who You Ask Image

Flat Fee or Consumption-Based E-Discovery Pricing? Depends on Who You Ask

Victoria Hudgins

Being charged per gigabyte by an e-discovery software platform isn't new, but it can still be a budgetary drain for law firms that handle many large e-discovery matters.

Features

Slut-Shamed In the Workplace? Avoiding Exposure for Your Employees' Exposure Image

Slut-Shamed In the Workplace? Avoiding Exposure for Your Employees' Exposure

John G. Browning

Situations involving an employee's voluntary online exposure rarely end well and can bring legal exposure for the employer.

Features

How to Address Evolving Privacy Regulations During Discovery Image

How to Address Evolving Privacy Regulations During Discovery

Gina Taranto

One Recipe for Success: Treat Private Data With the Same Priority Given to Privilege But for all the coverage that privacy regulations are meant to provide, there is precious little guidance about how to protect private information, and there is very little legal precedent to guide our practices.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • "Holy Fair Use, Batman": Copyright, Fair Use and the Dark Knight
    The copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.
    Read More ›
  • Legal Possession: What Does It Mean?
    Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
    Read More ›