Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Securing Your Information-Rich Employee Benefit Plans Image

Securing Your Information-Rich Employee Benefit Plans

Robert M. Projansky & Miriam S. Dubin

Hackers have turned to a new information-rich source: employee benefit plans. This article examines the threat facing benefit plans, explores the applicable legal landscape, and recommends steps to better equip plans to prepare for and manage data breaches.

Features

<i>Legal Tech</i><br> Teaching an Old Dog New Tricks: Business Process Management and Law Firms Image

<i>Legal Tech</i><br> Teaching an Old Dog New Tricks: Business Process Management and Law Firms

Zachary Beauchemin & Alisha DiGiandomenico

Though traditionally considered laggards when adopting new technology, law firms have recently started to explore new tricks to fortify performance across their organizations. While this evolution is critical to a firm's survival, it's important that firm administrators understand that substantive improvements are only possible through multi-directional change.

Features

A Dragonfly in the Ointment: Cyber Attacks on the Energy Sector May Signal Dark Days Ahead Image

A Dragonfly in the Ointment: Cyber Attacks on the Energy Sector May Signal Dark Days Ahead

Michael Bahar, Trevor Satnick & Mark Thibodeaux

Recent attacks may not yet have resulted in damages or disruption, but the group appears to be positioning itself to learn how the targeted energy facilities operate while attempting to gain access to operational control systems, if they have not done so already.

Features

Vendor Contracting for Privacy and Security Image

Vendor Contracting for Privacy and Security

Chuck Kunz & Ian McCauley

In an effort to continue to capture ongoing and new business, vendors may be opening themselves up to liability due to poorly drafted contracts with companies. In addition, in a rush by companies to have data shifted to the cloud, privacy concerns may be dangerously minimized.

Features

Industry Vendors Exploited Via Industry-Wide Cyber Attacks Image

Industry Vendors Exploited Via Industry-Wide Cyber Attacks

Mark Sangster

<b><i>How to Protect Your Firm from Vendor Risks</b></i><p>The legal industry is still lulled into a false sense of security, mistakenly assuming that they are immune to a significant IT business outage, and that those unfortunate firms affected by cybercriminals were somehow lacking in adequate cybersecurity presages. That's simply not true. Even Achilles had a weak spot.

Features

Podcast: Implantable Microchips Image

Podcast: Implantable Microchips

Jason Thomas

Next in a series of podcasts looking at the cybersecurity and tech world.

Features

What's the Deal with WhatsApp: Investigating and Discovering Mobile Device Data? Image

What's the Deal with WhatsApp: Investigating and Discovering Mobile Device Data?

Julian Sheppard & Michele C.S. Lange

Analyzing data from mobile devices is still uncharted territory for many in Legal and IT. Accordingly, today's modern legal and technology professionals need to brush up on all things mobile. This includes understanding where applicable data resides in a mobile device and what common challenges are associated with accessing, preserving and extracting this data.

Features

Are 'Smart Contracts' Smart Enough? Image

Are 'Smart Contracts' Smart Enough?

Jonathan Bick

<b><i>Certain Legal Functions Can Be Automated with the Use of Blockchains</b></i><p>The automation of certain attorney functions has given rise to a new form of contracting, known as "smart contracts." Consequently, a decrease in the demand for certain attorney functions that can now be performed by Internet applications is matched by an increase in demand for legal advisers who can prepare smart contracts and ensure these smart contracts accurately reflect a desired business transaction.

Features

The Future Is Now: Global Litigation, Digital Workflows and Electronic Proceedings Image

The Future Is Now: Global Litigation, Digital Workflows and Electronic Proceedings

Charlie Harrel

Welcome to the new world of digital litigation, which is rapidly emerging in the context of an increasingly globalized world — a world where it is now commonplace for domestic law firms to extend their reach across international borders, engage in legal matters that span multiple jurisdictions, and collaborate with overseas colleagues and foreign counsel on a regular basis.

Features

Dark Web Marketplace Takedowns Mitigate Legal's Cyberthreat, But Only So Much Image

Dark Web Marketplace Takedowns Mitigate Legal's Cyberthreat, But Only So Much

Rhys Dipshan

The recent takedown of dark web marketplace AlphaBay represented a major success for law enforcement agencies in the U.S. and around the world. However, experts caution that its effect on mitigating the overall level of cyberthreat faced by corporations and law firms alike, while significant, will likely be temporary at best.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES