Features

The Anatomy of a Cyberattack: Step-by-Step
This article looks at each stage of a cyberattack, by way of a fictitious attack that took over a real estate agent's email account.
Features

Cybersecurity Awareness Must Extend Beyond the 'Month'
For all of that is created and consumed during October's Cybersecurity Month, it is disappointing to see how each year after all the thoughts have been shared, major security incidents continue to emerge. We need to begin to take stock of all the advice given during this month and put it to immediate practice.
Features

The Roadmap of Litigation Analytics
Litigation analytics can be considered a roadmap of sorts — an important guide to ensure the legal professional arrives at the correct litigation strategy or business plan. However, like roadmaps, litigation analytics will only be useful if it's based on data that is complete and accurate.
Features

New State Statutes and Federal Guidelines Create Basket Weave of Cybersecurity Compliance
The U.S. doesn't have a federal cybersecurity law, but that doesn't mean there is no cybersecurity industry standard. There are regulations, case law, guidelines and state laws that, when combined, create an industry standard applicable to almost all business sectors.
Features

How to Fight Online Defamation
Internet tools are becoming more sophisticated in measuring the impact of disparaging and defamatory online statements, paving the way for affected business owners and celebrities to fight back by filing defamation suits seeking to recover damages for the harm to their reputation and brand value.
Features

Ransomware Insurance: Understanding the Developing Legal & Regulatory Landscape
In light of the ever-growing ransomware threat, it is important to understand the developing legal and regulatory landscape in order to take the proper steps at the first sign of an attack, including getting the insurance company involved immediately.
Features

21st Century Data Dumps and the 'Brady' Rule
What are the document dump rules that apply today? And how does the Brady rule apply to this evolving area of criminal practice? This article will address these issues.
Features

Legal Tech: The Secret Life of E-Discovery Funding
The true extent of funding amounts fueling legal tech and e-discovery software companies will likely never be widely shared. The reason is simple: Without regulatory requirements, the competitive risks of disclosing these investments regularly outweighs any potential benefits.
Features

How Disney's Motion to Compel Arbitration of Scarlett Johansson's Lawsuit Over 'Day-and-Date' Release of Black Widow Movie Might Have Played Out
Johansson alleges that, in order to generate new subscribers for Disney+, Disney intentionally interfered with her talent agreement with Disney affiliate Marvel Studios for her featured role in Black Widow — and thus allegedly induced Marvel to breach a promise in the Johansson/Marvel agreement for the film to be initially distributed in exclusive "wide theatrical release." Updated Oct. 1 to reflect a confidential settlement reached in the case.
Features

Electronic Discovery Document Review: The Power of Feedback
Human review of documents will continue to play a huge part in the ediscovery process. Managing reviewer training and accuracy can make or break the budget for your matter.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The 'Sophisticated Insured' DefenseA majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.Read More ›
- The Brave New World of Cybersecurity Due Diligence in Mergers and Acquisitions: Pitfalls and OpportunitiesLike poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.Read More ›
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric CodeIn an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.Read More ›
- The New York Uniform Commercial Code Comes of AgeParties in large non-consumer transactions with no connection whatsoever to New York often choose its law to govern their transactions, and New York statutes permit them to do so. What most people do not know is that the New York Uniform Commercial Code is outdated.Read More ›