Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

The Power of Certifications in Legal Image

The Power of Certifications in Legal

Jared Coseglia

<b><i>Part Two of a Two-Part Article</b></i><p>Professionals in e-discovery and privacy, including lawyers, are hungry for growth opportunities and may be ripe to transition into certain security-centric positions; however, the security job landscape is far more expansive and far less commoditized than ESI or privacy — for now. Part Two provides a road map for how certifications can assist an individual or an organization in reinventing, repurposing, creating or maintaining cybersecurity talents.

Features

Navigating the Fear and Promise of Artificial Intelligence Image

Navigating the Fear and Promise of Artificial Intelligence

Jeff Reihl & Rick McFarland

With the corpus of law data becoming ever-more complex and nuanced, the use of machine-assisted research and analysis is becoming more of a requirement, rather than an option, in the legal profession. Because of this, some have expressed fear that robot-lawyers will replace legal professionals.

Features

Online Extra: The Evolving Nature of Cyber Law Image

Online Extra: The Evolving Nature of Cyber Law

Gabrielle Orum Hernández

<b><i>A Q&A with Penn Law Prof. Anne Toomey McKenna</b></i><p>The newly appointed Penn State professor sees a lot of room for questions in the evolving cyber law landscape, but so far there are few answers.

Features

Online Extra: Facebook's Blockchain Bet Could Place It in the Data Decentralization Debate Image

Online Extra: Facebook's Blockchain Bet Could Place It in the Data Decentralization Debate

Ian Lopez

<i><b>Oft-Considered an Avenue for Individuals to Attain Greater Control over Their Digital Information, Blockchain Could Be Leveraged By Facebook to Change Its Status As “Gatekeeper” for User Data</i></b><p>Facebook Inc. recently announced that it will begin exploring different ways to incorporate blockchain into its infrastructure. Yet, questions remain over how the social media company will implement the technology and what sort of legal challenges doing so could portend.

Features

Legal Tech: E-Discovery Case Digest Image

Legal Tech: E-Discovery Case Digest

Mike Hamilton

A look at key court rulings on e-discovery matters from the winter of 2017-18.

Features

Georgia Gov. Deals a Blow to Controversial Cybersecurity Bill Image

Georgia Gov. Deals a Blow to Controversial Cybersecurity Bill

Gabrielle Orum Hernández

Gov. Nathan Deal opted to veto a cybersecurity bill criticized by technology groups that would have made “unauthorized computer access” a crime.

Are U.S. Records Retention Requirements on a Collision Course with the GDPR's 'Right to Erasure?' Image

Are U.S. Records Retention Requirements on a Collision Course with the GDPR's 'Right to Erasure?'

Stacey Garrett

U.S. laws require companies to retain records for years, and sometimes forever, and violating U.S. records retention laws can result in domestic fines and penalties. How can U.S. companies comply with the GDPR's "right to erasure" while still fulfilling their U.S. records retention obligations?

Features

Are U.S. Records Retention Requirements on a Collision Course with the GDPR's 'Right to Erasure?' Image

Are U.S. Records Retention Requirements on a Collision Course with the GDPR's 'Right to Erasure?'

Stacey Garrett

U.S. laws require companies to retain records for years, and sometimes forever, and violating U.S. records retention laws can result in domestic fines and penalties. How can U.S. companies comply with the GDPR's “right to erasure” while still fulfilling their U.S. records retention obligations?

Features

Vendor Risk Management for Law Firms: 7 Steps to Success Image

Vendor Risk Management for Law Firms: 7 Steps to Success

Ishan Girdhar

Most firms have extensive cybersecurity measures in place, but emerging or unclear regulatory requirements embroil them in a never-ending cycle of evaluation, best-practices review, and implementation. Firms don't just need to have their own systems secured; a responsible firm must also reduce the risk of breach at their third-party vendors. As cloud service providers become commonplace, so too does a firm's responsibility to ensure their vendors are managing risk appropriately.

Features

How Law Firms Can Prepare for FinTech Wave Image

How Law Firms Can Prepare for FinTech Wave

Keith Fall & Taylor Miller 

<i><b>The Innovations and Industry Disruption Should Have Law Firms Snapping to Attention</b></i><p>The world of financial services is being upended by new technologies — from virtual currencies and blockchain to peer-to-peer lending and enhanced mobile banking — that are capturing customers, as well as the attention of Wall Street investors and industry regulators.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • "Holy Fair Use, Batman": Copyright, Fair Use and the Dark Knight
    The copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›