Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

New Data Types in the App Age Image

New Data Types in the App Age

Tim Anderson & JR Jenkins

While the threat of "big data" has cast a shadow over IT and legal departments for several years, the real challenge can often be the variety. The authors believe the real challenge is less about "big data" and more about "new data types" — that quickly defeat traditional collection and review tools and strategies.

Features

Future Shock? Uncertainty over Long-Term Effects of the FCC Privacy Rules Repeal Image

Future Shock? Uncertainty over Long-Term Effects of the FCC Privacy Rules Repeal

Rhys Dipshan

<b><i>The Repeal May Open Up ISPs to Future Legal Challenges on How and When They Can Sell Their Customer's Private Data</b></i><p>While the recent repeal of the Federal Communications Commissions' (FCC) broadband privacy rules have caused an uproar over what many may see as lagging federal data privacy protections, it does little to change how broadband ISPs handle their users' data.

Features

<b><i>Legal Tech: e-Discovery</b></i><br> <b><i>Solo v. United Parcel Services</b></i>: A Conversation About Proportionality Image

<b><i>Legal Tech: e-Discovery</b></i><br> <b><i>Solo v. United Parcel Services</b></i>: A Conversation About Proportionality

Mike Hamilton

Three leading e-discovery industry thought-leaders recap some of the latest case-law and provide their takeaways.

Features

The Growing Convergence of Cyber-Related Crime and Suspicious Activity Reporting Image

The Growing Convergence of Cyber-Related Crime and Suspicious Activity Reporting

Marjorie J. Peerce & Kevin Leitão

Regulators and law enforcement are taking proactive steps to further leverage anti–money-laundering monitoring and reporting tools in their battle with cyber attacks and cyber crimes. In-house legal and compliance teams need to be fully versed in the latest FinCEN and bank regulatory guidance on cyber-related crimes and have the right professionals available to assist them with these matters.

Features

Using Computer Forensics to Investigate Employee Data Theft Image

Using Computer Forensics to Investigate Employee Data Theft

Timothy M. Opsitnick, Joseph M. Anguilano & Trevor B. Tucker

When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft-of-IP analysis in order to preserve electronic data and uncover important evidence.

Features

State of the Industry: e-Discovery and Cybersecurity Image

State of the Industry: e-Discovery and Cybersecurity

Jared Coseglia

<b><i>Part One of a Three-Part Article</b></i><p>There are stark differences between e-discovery and cybersecurity, most notably that cybersecurity, as an avenue of career opportunity and responsibility, is much, much bigger. An examination of the current state of both industries coupled with a deep dive into the history of e-discovery will offer a prophetic look at the likely hiring patterns, job availability, compensation trends, and industry maturation of the cybersecurity vertical over the next decade.

Features

Information Governance: Law Firms' Cybersecurity Weak Spot Image

Information Governance: Law Firms' Cybersecurity Weak Spot

Ian Raine

Perimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.

Features

Survey Reflects Growth in How Corporations Manage and Protect Information Image

Survey Reflects Growth in How Corporations Manage and Protect Information

Ari Kaplan

Many organizations are changing their approach to leveraging cybersecurity intelligence through enhanced cooperation, detailed information sharing, and broad-based collaboration. To characterize those shifts and offer perspectives that empower effective benchmarking, for the third consecutive year, Nuix engaged my firm to interview corporate security officials. The report reflects the perspectives of 29 cybersecurity executives across a range of industries.

Features

Got a Negative Online Review? First Things First: Turn Off Your Attorney Image

Got a Negative Online Review? First Things First: Turn Off Your Attorney

Dan Lear

It happened. Some current or former client had the gall to write something less than flattering about you online. What do you do? The first thing to do, and this can be the hardest thing for attorneys, is to turn off your attorney. Feedback can be hard to take.

Features

Back in the GDPR Image

Back in the GDPR

Dan Panitz & H. Bruce Gordon

Any company operating globally should protect its value through exposure containment under both privacy shield and the forthcoming GDPR.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategic Uses of a Rule 2004 Exam
    While most bankruptcy practitioners are familiar with the basic concepts behind the Rule 2004 exam, some are less familiar with the procedural intricacies of obtaining, conducting, and responding to the exam ' intricacies that often involve practices and procedures adapted from civil discovery that are beyond the scope of pure bankruptcy practice. This article explains.
    Read More ›