Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Innovating Hybrid: Empathy and Iteration Image

Innovating Hybrid: Empathy and Iteration

Alaa Pasha

Recognizing that this is a time of innovation, one way law firms can 'prepare for a future we can't yet see' is through leveraging two key levers: the need for empathy and iteration.

Features

5 Digital Marketing Trends to Follow to Stay Competitive In 2023 Image

5 Digital Marketing Trends to Follow to Stay Competitive In 2023

Alexis Sikorski

Amid the seismic shift of law firms joining the digital revolution, five key trends are emerging that will help shape how clients interact with firms and determine who their representation will be in the coming year.

Features

What's In Store for the Blockchain Industry In 2023? Image

What's In Store for the Blockchain Industry In 2023?

Chris Sloan & Justin Daniels

The FTX bankruptcy caps a very difficult 2022 for the entire blockchain industry, spanning exchanges to decentralized finance to non-fungible tokens (NFTs). Blockchain and crypto skeptics are shouting "I told you so," while investors watch billions of investment dollars evaporate under the harsh light of the bankruptcies of Celsius, Compute North and now FTX.

Features

Is Asking E-Discovery Vendors for Indemnification for Data Breaches Provide Security of Clients' Data? Image

Is Asking E-Discovery Vendors for Indemnification for Data Breaches Provide Security of Clients' Data?

Cassandre Coyer

Threats of cyberattacks have not only made legal professionals more wary — especially as legal teams in firms and in-house are increasingly the target of cyber hackers — but it has also changed their relationship with vendors.

Features

Privilege Logs: Strategy, Best Practices and Practical Advice Image

Privilege Logs: Strategy, Best Practices and Practical Advice

Bansri McCarthy, Leonard Impagliazzo & Tara Lawler

This article provides an overview of the different types of privilege logs, lays out best practices for negotiating ESI or privilege-log protocols, and discusses other issues that can occur with privilege logs in e-discovery.

Features

Marketing Tech: Avoid Making Hasty Tech Decisions When In Crisis Mode Image

Marketing Tech: Avoid Making Hasty Tech Decisions When In Crisis Mode

Tomas Suros

In March 2020 and the months immediately following, many firms found themselves scrambling to implement tools that would meet the needs of new remote work realities. Understandably, many of these decisions were done quickly without the normal level of due diligence. Now, the same firms are realizing that those hasty, though necessary, decisions should be revisited or undone.

Columns & Departments

Upcoming Webinar Image

Upcoming Webinar

ssalkin

Join Board of Editors member Kyle-Beth Hilfer, Editor-in-Chief Howard Shire, Aaron Krowne and Wenew GC Christine Lawton for Counseling the NFT Client: A Practical Guide to Legal and Business Issues.

Features

Data Minimization Meets Defensible Disposition: Just Say No to ROT and Over-Retention of Personal Information Image

Data Minimization Meets Defensible Disposition: Just Say No to ROT and Over-Retention of Personal Information

Martin Tully & Nick Snavely

Like a good diet and regular exercise for the body, data minimization and routine, defensible purging of outmoded documents are essential to maintaining healthy organizational information hygiene.

Features

Leaning on Trusted Partners to Drive Legal Tech Adoption and Avoid Failed Implementation Image

Leaning on Trusted Partners to Drive Legal Tech Adoption and Avoid Failed Implementation

Mark Wilcox

Turning to familiar, trusted partners to help navigate the unruly waters of change management, adoption and an ocean of new legal technology options.

Features

FTX Bankruptcy Sends Tremors Through Crypto Regulation Image

FTX Bankruptcy Sends Tremors Through Crypto Regulation

Steven Salkin

The sudden and spectacular crash of crypto-exchange FTX will send long-lasting tremors through both the nation's financial regulatory and bankruptcy landscapes.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The 'Sophisticated Insured' Defense
    A majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.
    Read More ›
  • Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric Code
    In an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.
    Read More ›