Features
Cloud Computing Security: More Opportunity, Less Threat
If you follow the legal technology headlines you might have noticed that we've come full circle on cloud security. Rewind seven or so years, and mainstream cloud computing adoption was being thwarted by grave concerns about data security, data governance and data access. As the cloud became more pervasive in many industries globally, the legal market took note and slowly but surely more law firms went to the cloud.
Features
EU Approves GDPR
Coming off the heels of the EU Article 29 Working Party Opinion on the Privacy Shield, the EU Parliament passed the General Data Protection Regulation (GDPR) on April 15, which overhauls the union's Data Protection Directive rules set forth in 1995. This regulation applies to all business and organizations targeting EU consumers, regardless of their geographic location.
Features
Law Firms Grapple With Cybersecurity Issues and Regulatory Risks
Security is always a concern for law firms, and the risks have only grown in recent years. Increasingly, attorneys, staff and clients have become more mobile and rely on an array of laptops, smartphones and tablets to stay connected 24/7. As more data is created and resides in more places, it becomes more vulnerable.
Features
Ethics and Criminal Practice
Last month, we asked the question: When faced with a client whose social media postings may harm his legal case, is it ethical for the attorney to advise the client to alter or delete those postings? We conclude this discussion herein.
Features
Millennials Approaching Partnership: Now What?
Since debuting in law firms nearly a decade ago, the latest generation of lawyers has raised more than a few eyebrows. Workplace flexibility, firm culture integration, meaningful training with takeaways and clearly defined billable hour goal options were not nearly as mainstream before the arrival of the Millennials.
EU Privacy Pushback Prompts Lawyers to Look For Plan B
Companies that thought the new U.S.-EU "Privacy Shield" would restore legal certainty around trans-Atlantic data transfers may want to think again.
Features
Marketing Tech: Embracing IoT and Big Data Means Embracing Future Success
These days, we are continually being bombarded by one new tech concept after another ' the most current being IoT (or the Internet of Things) and Big Data. To feel secure moving our businesses forward among the onslaught of all these changes, it is necessary to simplify our understanding.
Features
Metals Exploration Bankruptcies
The past several years have not been kind to commodities exploration companies. And the difficult pricing environment has taken a toll on exploration companies.
Will Dave & Buster's ACA Employer-Mandate Plan Design Land It in Hot Water with ERISA?
Under the ACA, employers with 50 or more full-time, or full-time equivalent, employees on business days during the previous calendar year are required to offer qualified health care coverage to their full-time employees. If they fail to comply, employers may be faced with significant penalties.
Features
How to Win a Hague Convention Child Abduction Case
Here are some tips for attorneys and clients faced with instituting or defending child abduction proceedings under the Hague Convention on the Civil Aspects of International Child Abduction, whether in the United States or internationally.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- Private Equity Valuation: A Significant DecisionInsiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.Read More ›
- Meet the Lawyer Working on Inclusion Rider LanguageAt the Oscars in March, Best Actress winner Frances McDormand made “inclusion rider” go viral. But Kalpana Kotagal, a partner at Cohen Milstein Sellers & Toll had already worked for months to write the language for such provisions. Kotagal was developing legal language for contract provisions that Hollywood's elite could use to require studios and other partners to employ diverse workers on set.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity LitigationWhile the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.Read More ›