Features

The Increasing Challenges of Verification on Social Media
The recent flurry of online impersonators, ranging from accounts posing as President Joe Biden to the pharmaceutical company Eli Lilly, exposes the challenges of social media platforms' verification and authentication processes. These events show that monitoring and policing trademark infringements and right of publicity violations can be increasingly difficult in the social media context.
Features

Successful Hybrid Plans Offer 'Best of Both Worlds'
We're seeing is a variety of successful measures that are designed to help attorneys get what they want: a best-of-both worlds scenario where they keep some work-from-home and fold-in an opportunity to intentionally connect and collaborate with colleagues in the office.
Features

The Future of AI Is More Ironman than Terminator
Many fear cyborgs stealing corner offices from rainmakers, that the future will be Robolawyers instead of humans. The reality is that the most powerful AI today, when applied to complex areas like legal, is more reliant on human interaction, not less.
Features

U.S. Supreme Court Will Hear Political Football Section 230 Case — Why This One?
The Supreme Court has decided in the context of national security to consider the parameters of, and possible limits to, "Section 230" liability protections for social media companies. The question is why this case? The Supreme Court has decided to accept a case that, while sounding narrow and technical, actually goes to the heart of the way many Internet platforms operate — algorithmic targeted content recommendations.
Features

Legal Tech: The Attorney-Client Privilege Purpose Requirement and E-Discovery
On Jan. 9, the U.S. Supreme Court heard oral argument on whether the attorney-client privilege protects against disclosure of dual-purpose communications — where the communications contain both legal and nonlegal advice.
Features

Regulators Reaching Deep In Their Toolbox to Prosecute Users of Encrypted Messages
If you use Whatsapp or similar platforms for work-related communications, then you've probably heard that regulators are putting an end to that practice. Ephemeral and encrypted messaging, they have noted, evades monitoring and prevents retention. A seldom used doctrine allows prosecutors to charge executives with misdemeanor offenses just for being in the position of power when others commit the misconduct. Rather than take a wait-and-see approach, companies and their leaders would do well to prepare for prosecutors to reach deep into their toolbox.
Features

Typically Uncommon: Defending Class Action Certification in Data Breach Litigation
The most common questions and key elements of a negligence claim are whether the defendant breached a duty of care, whether there is any injury as a result of the defendant's breach of any purported duty of care, and whether the defendant's alleged breach caused the plaintiff any damages. While these essential questions and elements apply with equal force in data breach litigation, the difficult question to answer in these cases is "what is the value, if any, of your injury or damages?"
Features

A Legal CIO's Guide to Technology Procurement In 2023
For a legal CIO, one of the key responsibilities is to establish that the organization has the right technology in place to support its operations and achieve its business goals. This can be challenging, as there are many factors to consider when choosing new technology for your organization. One bad decision can have a material impact on not only the bottom line, but on the ability of your firm to compete in an ever-changing legal market.
Features

Best Practices In Second Request Document Review: Eliminating the Fear Factor
Part One of a Two-Part Article: Challenges and solutions in document review HSR second requests have become increasingly common in mergers or acquisitions that meet the premerger reporting threshold, which in 2022 was a transaction value of more than $101 million. The burdens of complying with second requests are onerous. The mere thought of undergoing such an exercise tends to strike fear in the heart of the legal department. In this article series, we'll outline the major challenges of second requests, suggest strategies to overcome them, and discuss how to face a second request with equanimity and confidence.
Features

The NFT Market and Fallout from the FTX Scandal
The FTX bankruptcy scandal that has shaken the largely unregulated cryptocurrency world has slowed but isn't likely to end the roll-out of celebrity-related, non-fungible digital token (NFT) offerings. But how might the FTX story impact a push for federal regulation of the NFT market?
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The 'Sophisticated Insured' DefenseA majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.Read More ›
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- The Brave New World of Cybersecurity Due Diligence in Mergers and Acquisitions: Pitfalls and OpportunitiesLike poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.Read More ›
- Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric CodeIn an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.Read More ›
- Guidance on Distributions As 'Disbursements' and U.S. Trustee FeesIn a recent case from the Bankruptcy Court for the District of Delaware, In re Paragon Offshore PLC, the bankruptcy court provided guidance on whether a post-plan effective date litigation trust's distributions constituted disbursements subject to the U.S. Trustee fee "tax."Read More ›