Features

Legislative Protections Against AI Voice Scams
A wide range of tools have been developed to perform vocal cloning, leading to vocal deepfakes becoming a common source of scams and misinformation. And these issues have only been exacerbated by a lack of appropriate laws and regulations to rein in the use of AI and protect an individual's right to their voice.
Features

Midlevel Associates Frustrated By Firms' Lack of Tech-Savviness
In this year's Midlevel Associate Tech Survey, a number of associates at top firms once again said they were frustrated by their firms' lack of tech savviness and willingness to upgrade equipment. This echoes complaints from last year, and it should be noted that the survey regularly elicits similar criticisms about some of the world's richest law firms' technology.
Features

LJN Quarterly Update: 2024 Q3
The LJN Quarterly Update highlights some of the articles from the nine LJN Newsletters titles over the quarter. Articles include in-depth analysis and insights from lawyers and other practice area experts.
Features

Hyperlinked Documents: The Latest e-Discovery Challenge
As courts and discovery experts debate whether hyperlinked content should be treated the same as traditional attachments, legal practitioners are grappling with the technical and legal complexities of collecting, analyzing and reviewing these documents in real-world cases.
Features

Risks and Ad Fraud Protection In Digital Advertising
The ever-evolving digital marketing landscape, coupled with the industry-wide adoption of programmatic advertising, poses a significant threat to the effectiveness and integrity of digital advertising campaigns. This article explores various risks to digital advertising from pixel stuffing and ad stacking to domain spoofing and bots. It will also explore what should be done to ensure ad fraud protection and improve effectiveness.
Features

The Fourth Amendment and ESI
Courts have long acknowledged that searches of computers and other mediums storing electronic information (ESI) often involve a degree of intrusiveness much greater in quantity and in kind from searches of other containers. This article reviews some recent case law that spotlights this ever developing area of the law.
Features

The Benefits of Blockchain for e-Discovery and Data Preservation
As businesses across various industries increasingly adopt blockchain, it will become a critical source of discoverable electronically stored information. The potential benefits of blockchain for e-discovery and data preservation are substantial, making it an area of growing interest and importance.
Features

Phase 2 of PA's Insurance Data Security Law Is Coming — Record of Compliance Required
In 2023, Pennsylvania joined the growing number of states enacting the National Association of Insurance Commissioners' (NAIC) Model Law on Insurance Data Security. On Dec. 11, 2024 (just four months away), the second phase of the law goes into effect, which requires licensees to undertake detailed risk assessments, design and implement comprehensive and written cybersecurity programs, and, for some organizations, publicly certify compliance with the law.
Features

Legal Remedies Against Revenge Porn
Instant access to the internet has made sharing photographs online easy. Unfortunately, this has opened the door to revenge porn. Revenge porn is a serious violation of privacy that can have devastating consequences for victims. How might a victim of revenge porn counteract posts of compromising photographs to social media?
Features

Why High-Quality AI Data Is Crucial to Fighting Financial Crime
Integrating AI is more than just picking an AI solution. Counsels need to ensure they take a strategic approach to integrating this technology and understand the business and financial crime risk exposures they may face.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- CLE Shouldn't Be the Only Mandatory Training for AttorneysEach stage of an attorney's career offers opportunities for a curriculum that addresses both the individual's and the firm's need to drive success.Read More ›
- Discovery of Claim Construction and Infringement Analysis May be Compelled Prior to a Markman HearingA defendant in a patent infringement suit may, during discovery and prior to a <i>Markman</i> hearing, compel the plaintiff to produce claim charts, claim constructions, and element-by-element infringement analyses.Read More ›
- AI's Growing Impact On the Gaming IndustryThe gaming and wagering sector has begun to cross paths with artificial intelligence technology in ways both predictable and unforeseen. As with other industries, AI technology inevitably has found its way into various components of the gaming experience. What is striking, however, is how AI is revolutionizing gaming for operators, regulators, suppliers and patrons alike.Read More ›
- DOJ and States Open Antitrust Case Against Google for Monopolizing Internet Search MarketThe U.S. Department of Justice and dozens of states opened their antitrust case against Google in Washington last month, accusing the tech giant of illegally monopolizing the internet search and related ad markets.Read More ›
- The Anatomy of a Supply Chain CyberattackMitigating Its Risks and the Call for Standardization of Software Development Security Protocols This article details the anatomy of a supply chain cyberattack, explores the existing state of supply chain protective contractual terms, and proposes actionable steps with a collective approach to guide legal professionals through their precarious endeavors.Read More ›