Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Legal Tech: Fall 2020's Most Interesting E-Discovery Cases Image

Legal Tech: Fall 2020's Most Interesting E-Discovery Cases

Mike Hamilton

In this quarter's Case Law Review, we'll take a look at recent rulings that cover the discoverability of ESI on sources other than a computer, whether social media posts offer any degree of privacy, and the importance of proportionality when attempting to compel production during litigation.

Columns & Departments

Upcoming Events

ssalkin

TexasBarCLE 30th Annual Entertainment Law Institute Nashville Bar Association Annual Entertainment, Sports & Media Law Institute

Features

If 2020 Is a Wash, Make 2021 Better By Setting a Marketing Strategy Image

If 2020 Is a Wash, Make 2021 Better By Setting a Marketing Strategy

Amanda Sexton

If you're feeling drained or unsure what the next year will bring, try doing something optimistic and strategic. Try working on your 2021 budget.

Features

DOJ's China Initiative Poses Growing Risks for Those with Chinese Ties Image

DOJ's China Initiative Poses Growing Risks for Those with Chinese Ties

John N. Joseph, Carolyn H. Kendall & Yune D. Emeritz

In the two years since it's unveiling, the Initiative has expanded its scope from prosecutions of individuals suspected of stealing for China to those who simply have Chinese ties. The department is now increasing its mission to investigate individuals who are merely associated with Chinese recruitment programs.

Columns & Departments

IP News

Jeff Ginsberg & George Soussou

Federal Circuit: HP Not Estopped from Challenging Claims Deemed Unchallengeable in IPR That It Had Joined Federal Circuit: A New Process Does Not Transform an Old Product Into a New One

Features

Preventing and Mitigating Cultural Engineering Attacks During M&A: What Every Law Firm Needs to Know Image

Preventing and Mitigating Cultural Engineering Attacks During M&A: What Every Law Firm Needs to Know

Mark Sangster

Criminals have long taken advantage of unrest and instability, knowing that people's attention will be diverted and their defenses down during uncertain times. This leaves ample space for the less altruistic among us to move in and manipulate a situation to their benefit.

Features

Ransomware: To Pay or Not to Pay Is Not the Question Image

Ransomware: To Pay or Not to Pay Is Not the Question

Michel Sahyoun

Ransomware has come a long way since the 1989 "AIDS Trojan." In 2019 ransomware demands topped $12M. Succinctly put: "Ransom demands grew larger. Tactics became more cutthroat."

Features

Are Rule 12(b)(6) Dismissals In Copyright Infringement Lawsuits In Danger? Image

Are Rule 12(b)(6) Dismissals In Copyright Infringement Lawsuits In Danger?

Alan Friedman

Until recently, the Second and Ninth Circuits have both been receptive to dismissals under Rule 12(b)(6) if the court determines the plaintiff cannot plausibly state a claim of copyright infringement because the two works are not substantial similar. However, a pair of recent "unpublished" Ninth Circuit reversals involving prominent motion pictures stand in contrast to a recent Second Circuit decision affirming such a dismissal.

Features

Data Is Fluid -- So Why Are Data Maps Static? Image

Data Is Fluid -- So Why Are Data Maps Static?

Dean Gonsowski

Data "in transit," or in motion, is data that is moving from one location to other, such as from device to device or through a private network. Data "at rest" is data that is not actively moving from place to place, such as archived data. Protecting data in motion and at rest is crucial for data-driven enterprises as hackers continue to come up with new ways to attack.

Features

It's 2025: What Did We Do to Successfully Shift Law Firm Operations? Image

It's 2025: What Did We Do to Successfully Shift Law Firm Operations?

Rob Mattern

A Look Back from the Future If we look back at 2020 five years from now, what will we point to as the key actions that brought law firms back, and which of those are still in play.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES