Features

Retiring Boomers Pose Big Challenges For Firms
The boomer generation — 75 million Americans born between 1946 and 1964 — and a tiny cadre of over-70s Silent Generation lawyers currently make up just under half of partners at Am Law 200 firms. As partners with the greatest seniority, they constitute a majority in the equity and management ranks, and control an outsize share of client relationships. The impacts of retirement are amplified because a long surge in hiring and promotion that began when boomers entered law firms has halted since the financial crisis.
Features

Duty to Warn and Third-Party Conduct: A Look at Two Recent New York Cases
In the past year, New York's highest court, the Court of Appeals, issued two decisions addressing both the scope of a defendant's duty to warn in negligence and products liability actions, and the scope of tort liability in actions predicated upon third-party conduct.
Features

Managing Risk in Light of 'Shadow IT'
Information Governance in the Age of Cloud Application Proliferation
Features

Law Firms, Meet Your New Regulator: Your Clients
While major banks, retailers, hospitals and insurance companies were the brick and mortar of a growing media monument to hubris and cyber overconfidence, law firm breaches went mostly unnoticed. That is, until government agencies and law enforcement grew concerned that the wealth of intellectual property curated by law firms could be used to manipulate financial markets by front running trades.
Features

Client Document Security Audits: Is Your Law Firm Ready?
It is essential for all law firms to safeguard their clients' documents against ever-evolving threats and thoroughly understand the security challenges and potential solutions in today's demanding world of legal document compliance.
Features

Looking to the FFIEC Revised Information Security Booklet for Best Practices in Data Security for Financial Institutions
The Federal Financial Institutions Examination Council (FFIEC) recently revised its Information Security Booklet. The changes bring the financial services industry closer to the goal of having a clearly defined set of cybersecurity and data protection protocols to ensure regulatory compliance.
Features

Optional Safety Equipment
<b><i>Part Two of a Two-Part Article</b></i><p><p>In last month's newsletter, the author began a discussion of the manufacturer practice of making increased safety features available to purchasers — but only for a price. The discussion concludes herein.
Features

Legal Tech: e-Discovery: Judge Says 'NO' to Party's Bid to Force Use of Predictive Coding
Would Judge Peck's admiration and advocacy for predictive coding lead him, upon a request by the opposing party, to force a responding party to use it against that party's own wishes? Judge Peck recently faced this issue, putting potential use of predictive coding at odds with established precedent and procedure regarding how to conduct discovery.
Columns & Departments
Movers & Shakers
Movers & Shakers Law firm Venable recently announced the addition of former AOL Inc. chief counsel, Charles D. Curran, as a partner in…
Features

Introducing the Cybersecurity Reference Model
When EDRM and CSRM Collide, Much Is Illuminated About the Hiring Trends in Both e-Discovery and Cybersecurity
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Enhanced Oversight of Search Warrants and Title III WiretapsSearch warrants and wiretaps were once used primarily to investigate organized crime, drug dealing and terrorism. In recent years, however, prosecutors have employed these tools increasingly in the context of white-collar crime to the point where it is now commonplace.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The Right to Associate in the DefenseThe "right to associate" permits the insurer to work with the insured to investigate, defend, or settle a claim. Such partnerships protect the insurer and can prove beneficial to the insured's underlying case and ultimate exposure.Read More ›
- DOJ's Cyber Fraud Initiative: A Wake-up Call That Keeps RingingDOJ's Cyber Fraud Initiative has been a wake-up call for companies to prioritize cybersecurity and adhere to stringent standards. By leveraging the FCA, DOJ has used a powerful enforcement tool to target a wide range of cybersecurity failures and misrepresentations. The increasing focus on cybersecurity by enforcement agencies means that robust cybersecurity practices are becoming a standard expectation, not just a best practice.Read More ›