Features

3 Steps to Ensuring Your AI Initiative Does Not Fail
The energy in the legal industry surrounding artificial intelligence (AI) is undeniable. Law firms are investing in innovation or undertaking experiments to test the viability of applying AI-enabled tools to various disciplines. Legal professionals are packing presentations to learn if, how and when the heralded disruption will impact their careers.
Features

GDPR Gets Real
A procrastinator's guide to overcoming technical challenges in GDPR compliance.
Features

The Arrival of Justice Gorsuch May Bring Opportunity to Reform the Collective Entity Doctrine
Recognizing a Fifth Amendment privilege for corporations — whether through wholesale abolition of the collective entity doctrine or by recognizing some limited exception for custodians of smaller corporations — would not foreclose meaningful white-collar prosecutions, but it would restore protection of the Fifth Amendment rights of individuals who are sacrificed under the current bright-line rule. Will Justice Gorsuch help in this endeavor?
Features

Corporate FCPA Enforcement in the Era of Trump
<b><I>Part Two of a Two-Part Article </I></b><p>As the penalties being extracted by the United States from multinational corporations for violations of anti-corruption statutes have skyrocketed in recent years, an increasing number of other countries have begun to pass or enhance their own laws prohibiting, among other things, bribery of foreign officials, and have increased the financial penalties applicable to businesses that violate those laws.
Features

Employee Privacy and Corporate Email Accounts
The use of business email accounts and digital devices for personal communications can be risky for both employers and employees. However, employees of all levels may be commingling corporate communications with their personal information, according to new research.
Features
Corporate FCPA Enforcement in the Era of Trump
<b><I>Part Two of a Two-Part Article </I></b><p> As the penalties being extracted by the United States from multinational corporations for violations of anti-corruption statutes have skyrocketed in recent years, an increasing number of other countries have begun to pass or enhance their own laws prohibiting, among other things, bribery of foreign officials, and have increased the financial penalties applicable to businesses that violate those laws.
Features

New Data Types in the App Age
While the threat of "big data" has cast a shadow over IT and legal departments for several years, the real challenge can often be the variety. The authors believe the real challenge is less about "big data" and more about "new data types" — that quickly defeat traditional collection and review tools and strategies.
Features

State of the Industry: e-Discovery and Cybersecurity
<b><i>Part One of a Three-Part Article</b></i><p>There are stark differences between e-discovery and cybersecurity, most notably that cybersecurity, as an avenue of career opportunity and responsibility, is much, much bigger. An examination of the current state of both industries coupled with a deep dive into the history of e-discovery will offer a prophetic look at the likely hiring patterns, job availability, compensation trends, and industry maturation of the cybersecurity vertical over the next decade.
Features

Information Governance: Law Firms' Cybersecurity Weak Spot
Perimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.
Features

Survey Reflects Growth in How Corporations Manage and Protect Information
Many organizations are changing their approach to leveraging cybersecurity intelligence through enhanced cooperation, detailed information sharing, and broad-based collaboration. To characterize those shifts and offer perspectives that empower effective benchmarking, for the third consecutive year, Nuix engaged my firm to interview corporate security officials. The report reflects the perspectives of 29 cybersecurity executives across a range of industries.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- The Anti-Assignment Override ProvisionsUCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›