Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Columns & Departments

Case Notes Image

Case Notes

ljnstaff

In-depth discussion of an important ruling.

Features

Data Breach Prevention and Information Governance Go Hand-In-Hand Image

Data Breach Prevention and Information Governance Go Hand-In-Hand

Jake Frazier

Information governance has a wide range of varying definitions, depending on whom you ask. Some consider it to be an amorphous collection of policies that are difficult to translate into the real world. Others view it as a holistic strategy document, or a series of discrete, tactical projects that implement best practices in data security or storage optimization.

Features

China's Second Draft Cybersecurity Law's Expanded Data Localization Requirement Image

China's Second Draft Cybersecurity Law's Expanded Data Localization Requirement

Tiana Zhang, Jodi Wu, Sally Han & Mike He

Cybersecurity has remained a priority for the Chinese government in 2016. The second draft of the Cybersecurity Law was released for public comment on July 5, 2016. Although still in draft form, when it is adopted, the Cybersecurity Law will impose a number of requirements on companies with business operations within the territory of China that have been subject to heated discussions among multinational companies (MNCs).

Features

Cybersecurity Comes Together in Legal and Finance Image

Cybersecurity Comes Together in Legal and Finance

Ricci Dipshan

Since the dawn of the new millennium, technology has been expanding the reach and ability of criminals at breakneck speeds. Regulators have constantly found themselves running behind a new era of cyberthreats and dangers, struggling to respond to accidents while fortifying the road ahead.

Features

Four Ways Big Data Can Help Win Your Next Case Image

Four Ways Big Data Can Help Win Your Next Case

Lauren Bakewell

Analyzing data and providing the right kind of data is critically important to every aspect of legal activities. When you're expecting data to act as a secret weapon in the sales process, the courtroom, or to provide a strong foundation for your firm, the quality of your information is priceless. To uphold your firm's integrity and ensure its success, it's time to get your staffers off Google and arm them with data intelligence.

Features

Legal Tech: Ten Technologies That Will Make You Smarter, Faster (and Better Looking) Image

Legal Tech: Ten Technologies That Will Make You Smarter, Faster (and Better Looking)

Dan Lear

As a fan of technology, and legal technology specifically, I spend a lot of time researching what's new, helpful, or just plain interesting. Below are my top 10 as of this moment in 2016. All of them will either help improve how you run your law firm, plan for retirement, or will improve your personal life in some small but excellent way.

Features

Truth, or Big Data Dare Image

Truth, or Big Data Dare

Karen Ellis

With all of society's technological advancements, it is a bit shocking that there has only been ONE technology ever developed to sniff out lies. The polygraph, invented in 1921, has barely advanced since.

Features

Joint Ventures and Strategic Partnerships After the Defend Trade Secrets Act of 2016 Image

Joint Ventures and Strategic Partnerships After the Defend Trade Secrets Act of 2016

Christopher Pelham & Frederick D. Friedman

American companies, and foreign companies doing business in the United States, routinely collaborate with outside entities in mutually beneficial joint ventures and strategic partnerships. In that process, however, these companies can risk losing protection for their critical trade secrets to outsiders.

Features

Quarterly State Compliance Review Image

Quarterly State Compliance Review

Sandra Feldman

This edition of the Quarterly State Compliance Review looks at some legislation of interest to corporate lawyers that went into effect between Aug. 1 and Oct. 1, 2016, including amendments to Delaware's corporation and LLC laws. It also looks at some recent cases of interest, including two decisions from the Delaware Chancery Court.

Features

Five Tips for Buying Cyberinsurance Image

Five Tips for Buying Cyberinsurance

Peri N. Mahaley

Massive cyberattacks and data breaches have become routine. The window of opportunity for obtaining insurance coverage for the resulting costs under "traditional" first-party or general liability policies is rapidly closing. Here's what you need to know.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Disconnect Between In-House and Outside Counsel
    'Disconnect Between In-House and Outside Counsel is a continuation of the discussion of client expectations and the disconnect that often occurs. And although the outside attorneys should be pursuing how inside-counsel actually think, inside counsel should make an effort to impart this information without waiting to be asked.
    Read More ›
  • Divorce Lawyers' Obligation to Children
    Do divorce lawyers have an obligation to disclose client confidences when it is in the best interests of the client's child to do so? The short answer of the rules of professional responsibility is 'no' because a 'yes' answer is deemed to be fundamentally inconsistent with the premises of the adversary system in which the divorce lawyer functions. The longer answer is that the rules encourage ' but do not require ' a divorce lawyer to counsel the client to authorize the disclosure because it is in the best interests of both parent and child.
    Read More ›
  • Upping the Legal Training Ante
    Womble Carlyle's technology training and online learning programs were in need of an upgrade. Unprecedented firm growth, heightened emphasis on developing lawyers' core technology competencies, and a need to streamline and automate existing e-learning processes led the firm to initiate a fundamental shift.
    Read More ›