Features
Using Computer Forensics to Investigate Employee Data Theft
When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft-of-IP analysis in order to preserve electronic data and uncover important evidence.
Features
State of the Industry: e-Discovery and Cybersecurity
<b><i>Part One of a Three-Part Article</b></i><p>There are stark differences between e-discovery and cybersecurity, most notably that cybersecurity, as an avenue of career opportunity and responsibility, is much, much bigger. An examination of the current state of both industries coupled with a deep dive into the history of e-discovery will offer a prophetic look at the likely hiring patterns, job availability, compensation trends, and industry maturation of the cybersecurity vertical over the next decade.
Features
Got a Negative Online Review? First Things First: Turn Off Your Attorney
It happened. Some current or former client had the gall to write something less than flattering about you online. What do you do? The first thing to do, and this can be the hardest thing for attorneys, is to turn off your attorney. Feedback can be hard to take.
Features
Are Pharmacy Benefit Managers' Cost-Containment Claims a Shell Game?
In today's political climate, one of the hottest topics is the rising cost of healthcare and drugs. Following the last election, all industries should anticipate change, especially in healthcare. While much of the focus is currently on whether the Affordable Care Act will be repealed, one of the areas the government continues to scrutinize is costs.
Features
<i>Decision of Note</i><br>Suit Seeking Public Doman Status for 'Buck Rogers' Can Move Forward
Team Angry Filmworks' lawsuit seeking public domain status for science fiction hero "Buck Rogers" adventures is set to blast off now that the U.S. District Court for the Western District of Pennsylvania denied a request to dismiss filed by the trust that licenses Rogers material.
Features
Information Governance: Law Firms' Cybersecurity Weak Spot
Perimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.
Features
Survey Reflects Growth in How Corporations Manage and Protect Information
Many organizations are changing their approach to leveraging cybersecurity intelligence through enhanced cooperation, detailed information sharing, and broad-based collaboration. To characterize those shifts and offer perspectives that empower effective benchmarking, for the third consecutive year, Nuix engaged my firm to interview corporate security officials. The report reflects the perspectives of 29 cybersecurity executives across a range of industries.
Features
Institutional Deliberate Indifference
<b><i>When a Prisoner's Health Care Is Botched, the Providers' Employer May Be on the Hook</b></i><p>Prisoner Eighth Amendment allegations of cruel and unusual punishment due to deliberate indifference to their medical needs are common; most of them go nowhere. Once in a while, though, the care provided to a prisoner is so substandard that the case actually hurdles the defendants' motion for summary judgment and makes it to trial.
Features
David Boies' Film Venture Sues over <i>Jane</i> Financing
The Boies/Schiller Film Group (BSFG), a film finance venture founded by renowned litigator David Boies and Zachary Schiller, has filed suit against investor Peter Nathaniel and his Boca Raton, FL-based investment fund Impala Partners LLC, accusing Nathaniel and Impala of misrepresentations that resulted in BSFG losing millions in its production of <i>Jane Got a Gun</i>, a 2016 film starring Natalie Portman that received middling reviews and underwhelmed at the box office.
Features
Senate Votes to Repeal FCC Internet Privacy Rules
The FCC's move to stop Internet service providers from collecting customers' personal information without consent has itself been halted. The Senate voted 50-48 on March 24 to overturn the rules, with the House expected to follow suit.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- ITC General Exclusion Orders Targeting All Importers Are On the RiseIn recent years, the ITC has issued more General Exclusion Orders (GEOs) than in the past. For importers of products potentially implicated by a requested GEO, the GEO can be a major threat even if the importer is not a respondent in the case.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The Roadmap of Litigation AnalyticsLitigation analytics can be considered a roadmap of sorts — an important guide to ensure the legal professional arrives at the correct litigation strategy or business plan. However, like roadmaps, litigation analytics will only be useful if it's based on data that is complete and accurate.Read More ›
