Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

<i>Case Study:</i> How Mesa Systems Resolved Its Phishing Issues Image

<i>Case Study:</i> How Mesa Systems Resolved Its Phishing Issues

Steven Davidson

Phishing is a constantly changing landscape, which requires unwavering attention and focus.

Features

<i>Online Extra</i>: e-Discovery Pioneer, Judge Andrew Peck, Retires Image

<i>Online Extra</i>: e-Discovery Pioneer, Judge Andrew Peck, Retires

Ian Lopez

<b><i>One of e-Discovery's Most Influential Figures</b></i><p>After over two decades as a magistrate judge for the Southern District of New York, Peck will retire and join DLA Piper.

Features

<i>e-Discovery:</i> Four Cases Highlighting e-Discovery Trends in the Second Half of 2017 Image

<i>e-Discovery:</i> Four Cases Highlighting e-Discovery Trends in the Second Half of 2017

Mike Hamilton

In the second half of 2017, case law served to clarify what does and does not constitute reasonable policies and procedures for preserving information subject to discovery — as well as the risks you run if you fail to follow through on those policies.

Features

Use of the Blockchain to Contract Digitally Image

Use of the Blockchain to Contract Digitally

Paige M. Boshell

Smart contracts are self-executing agreements written in code on the blockchain. Parties contract digitally using distributed ledger technology. This article offers a layperson's, non-technical summary of the underlying technology and consideration of certain legal implications for smart-contracting and contract management.

Features

Law Firm Security Q&A Image

Law Firm Security Q&A

Adam Schlagman

With the Appleby data breach still top of mind of many law firm and legal department professionals, cybersecurity has become a major area of concern. To learn more about how law firms can protect themselves against cyber attacks and data breaches, we sat down with Laurie Fischer, managing director at HBR Consulting.

Features

Second Edition ABA Cybersecurity Handbook Reflects the Need for Greater Awareness Image

Second Edition ABA Cybersecurity Handbook Reflects the Need for Greater Awareness

Mark Sangster

As 2017 came to a close, the American Bar Association opened the next chapter in cybersecurity awareness with the release of the second edition of its…

Features

Password-Sharing May Be a Federal Crime under the Muddied Waters of the CFAA Image

Password-Sharing May Be a Federal Crime under the Muddied Waters of the CFAA

Shain Khoshbin & Aaron Dilbeck

The Computer Fraud and Abuse Act (CFAA) is a federal statute that provides for not only criminal liability, but also civil liability, when a person accesses…

Features

Cybersecurity Spending at Law Firms, Legal Departments Is Predicted to Increase in 2018 Image

Cybersecurity Spending at Law Firms, Legal Departments Is Predicted to Increase in 2018

Ed Silverstein

As law firms and legal departments finalize their 2018 budgets, many lawyers in both the United States and Canada plan to increase cybersecurity spending.

Features

<i>Legal Tech:</i> Peril in Paper: <i>EEOC v. GMRI</i> and the Digital Divide in e-Discovery Sanctions Image

<i>Legal Tech:</i> Peril in Paper: <i>EEOC v. GMRI</i> and the Digital Divide in e-Discovery Sanctions

David Horrigan

There was a time not so long ago when the term “e-discovery” didn't exist. It was known simply by its legal name, discovery. We're now entering an era where some observers feel the term will fade into history, returning us back to simply calling it discovery.

Features

The Uber Breach and the Need for an Independent Privacy Function Image

The Uber Breach and the Need for an Independent Privacy Function

Paige Boshell

Uber has incurred significant legal and reputational exposure as a result of the way that the company handled the breach. In the coming months, there will be a great deal of information and regulatory and judicial action that will act as guidance, or more precisely, a checklist of what-not-to-do, for companies that suffer a data breach.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›