Features

It's Legalweek Time Again
This year, Legalweek will feature workshop boot camps, networking events, hundreds of exhibitors on the tradeshow floor and three conferences designed to address key issues at a functional level: LegalCIO, Legal Business Strategy, and, of course, Legaltech, the world's largest and longest running trade show for legal technology.
Features

Legal Tech: Babst Calland & Solvaire: An AI Contract Review Use Case
In today's business climate, clients demand greater efficiency when it comes to contract review for many complex deals and transactions. We have found that the combination of deep legal expertise, coupled with embracing carefully researched and vetted technology, is the most effective means of delivering high quality and timely review in an increasingly competitive marketplace.
Features

Digital Dive: New Report Reveals Opportunities for Improvement on Digital Marketing Strategy for Law Firms
For those of us who have devoted more years in legal marketing than we'd care to admit, it's heartening to see the field receiving the recognition it deserves. The demand for top talent has never been higher and marketing plans are getting more attention from firm management. Still, there is more work for law firms to do. That's particularly true in digital marketing.
Features

Supreme Court, Finally, Takes Up Google v. Oracle
The U.S. Supreme Court has jumped into a titanic copyright battle between Oracle Corp. and Google LLC with both barrels. The court's involvement is sure to reignite a 50-year-old debate over how much, if any, software should be subject to copyright, and the contours of the fair use defense in the digital age.
Features

Effectively Managing Increasing Client Security Requirements
Gone are the days of naively assuming our confidential data is secure. Increasingly, clients, stakeholders, regulators and others are demanding proof that firms are actively protecting the PII to which they have access, and this evidence is being demanded both before and after security incidents. It is imperative law firms have the positions and processes in place to handle security incidents with urgency, accuracy and completeness.
Features

Law Firms Enter the Golden Age of Data Mining
As a matter of practice, law firms generate and store incomprehensible amounts of data. Most, if not all, of that data has been digitized and many firms that recognize the untapped value of their data have begun to leverage sophisticated technologies to mine it for reusable work product and valuable insights.
Features

Can Artificial Intelligence Fix Security Issues?
There is great enthusiasm about what AI can do to promote better living conditions, evoking wisdom, providing business intelligence through deep analysis of behavior and habits, by signaling trends and anticipating demand. But there are other considerations as well. A critical one is cybersecurity.
Features

How the Healthcare Industry Can Fight Rising Cyber-Attacks
The healthcare industry is facing an alarming proliferation of cyber perils. Why? Because our healthcare system is a "soft target," and particularly vulnerable because of its lifesaving work, where time is of the essence. It's a recipe for disaster from a cybersecurity standpoint.
Features

Cybersecurity Experts Needed in U.S.
The Country Is In Dire Need of Experts Who Possess the Advanced Knowledge, Skills and Experience Required to Combat Cybersecurity Crimes In an effort to protect our financial, personal, medical, and otherwise confidential data, as well as our election systems, we need to continue to attract and employ the services of the most qualified cybersecurity experts from around the world. However, at present, there is a dire shortage of such qualified experts in the United States.
Features

Unique Cyber Risks Faced By the Cannabis Industry
All companies face cybersecurity threats, but the legalized cannabis industry's storage of personally identifiable information and reliance on seed-to-sale tracking software can place it firmly within hackers' crosshairs.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- The Brave New World of Cybersecurity Due Diligence in Mergers and Acquisitions: Pitfalls and OpportunitiesLike poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.Read More ›
- The 'Sophisticated Insured' DefenseA majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- The New York Uniform Commercial Code Comes of AgeParties in large non-consumer transactions with no connection whatsoever to New York often choose its law to govern their transactions, and New York statutes permit them to do so. What most people do not know is that the New York Uniform Commercial Code is outdated.Read More ›