Features
China's Second Draft Cybersecurity Law's Expanded Data Localization Requirement
Cybersecurity has remained a priority for the Chinese government in 2016. The second draft of the Cybersecurity Law was released for public comment on July 5, 2016. Although still in draft form, when it is adopted, the Cybersecurity Law will impose a number of requirements on companies with business operations within the territory of China that have been subject to heated discussions among multinational companies (MNCs).
Features
Cybersecurity Comes Together in Legal and Finance
Since the dawn of the new millennium, technology has been expanding the reach and ability of criminals at breakneck speeds. Regulators have constantly found themselves running behind a new era of cyberthreats and dangers, struggling to respond to accidents while fortifying the road ahead.
Features
Four Ways Big Data Can Help Win Your Next Case
Analyzing data and providing the right kind of data is critically important to every aspect of legal activities. When you're expecting data to act as a secret weapon in the sales process, the courtroom, or to provide a strong foundation for your firm, the quality of your information is priceless. To uphold your firm's integrity and ensure its success, it's time to get your staffers off Google and arm them with data intelligence.
Features
Legal Tech: Ten Technologies That Will Make You Smarter, Faster (and Better Looking)
As a fan of technology, and legal technology specifically, I spend a lot of time researching what's new, helpful, or just plain interesting. Below are my top 10 as of this moment in 2016. All of them will either help improve how you run your law firm, plan for retirement, or will improve your personal life in some small but excellent way.
Features
Truth, or Big Data Dare
With all of society's technological advancements, it is a bit shocking that there has only been ONE technology ever developed to sniff out lies. The polygraph, invented in 1921, has barely advanced since.
Features
Joint Ventures and Strategic Partnerships After the Defend Trade Secrets Act of 2016
American companies, and foreign companies doing business in the United States, routinely collaborate with outside entities in mutually beneficial joint ventures and strategic partnerships. In that process, however, these companies can risk losing protection for their critical trade secrets to outsiders.
Features
Quarterly State Compliance Review
This edition of the Quarterly State Compliance Review looks at some legislation of interest to corporate lawyers that went into effect between Aug. 1 and Oct. 1, 2016, including amendments to Delaware's corporation and LLC laws. It also looks at some recent cases of interest, including two decisions from the Delaware Chancery Court.
Features
Five Tips for Buying Cyberinsurance
Massive cyberattacks and data breaches have become routine. The window of opportunity for obtaining insurance coverage for the resulting costs under "traditional" first-party or general liability policies is rapidly closing. Here's what you need to know.
Features
Employee Benefit Plan Information
High-profile cyberattacks and data breaches have become routine occurrences. Cyber threats are so pervasive that many privacy and security experts advise that responsible parties ' like fiduciaries of employee benefit plans ' should prepare for when a data breach occurs, not if.
Features
The Internal Audit Function
Among the many responsibilities of an audit committee, overseeing the function of internal audit can be among the more challenging and complex. As a result, it is common for an internal audit function to be required and the scope of that function subject to the oversight of the audit committee. From a governance perspective, what is the mission of internal audit?
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The Business of Legal Spend: How Finance Professionals Can Drive Smarter Outside Counsel ManagementLegal spend has become a core business issue that now shapes financial planning, operational decision making and risk management. What once lived primarily in the legal department has become a shared responsibility across client legal, finance, and operations teams and their outside counsel.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- When Efficiency Meets the Duty to Verify: Reflections on The Verification-Value ParadoxThe Verification-Value Paradox states that increases in efficiency from AI use “will be met by a correspondingly greater imperative to manually verify” the outputs. The result is that the net value of AI in many legal contexts may be negligible once verification is honestly accounted for. For low-stakes tasks, verification costs are light. For core legal work, verification costs are heavy. That’s the tension.Read More ›
