Features

Legal Tech: A Deep Dive Into the Tech Upgrades in Thomson Reuters' Westlaw Edge
The new technology offering from Thomson Reuters features a retooled warning system for questionable law, an expanded litigation analytics offering, and more.
Features

Law Firms Need Artificial Intelligence to Stay in the Game
The Legal Department Is Savvier and Has More Options In the Form of ASPs and Legal Technology. It's Time for Law Firms to Embrace Change. AI Is a Key Ingredient In Doing So.
Features

Blockchain and GDPR — Frenemies?
In a nutshell, GDPR mandates that individuals have access and control over the use and maintenance of their data in certain circumstances, while the foundation of blockchain relies on the immutability of data. On the surface, these concepts seem in direct conflict with each other. This article discusses the points where GDPR and blockchain share common ground, where conflicts may exist and possible approaches for mitigating those conflicts.
Features

Why Encryption Is the Key to Ensure Data Privacy in the Cloud
At both a personal and corporate level, there are huge gains to be made in protecting against data breaches. The fact is that well-implemented client-side encryption — where the corporate user keeps their own key rather than entrusting a third party to guard their sensitive information — is the only sure way to guarantee data privacy when storing data on other people's servers.
Features

This is Not Your Father's Cloud (Part Two)
<b><i>Part Two of a Two-Part Article</b></i><p>In Part One of this article last month, we began a discussion designed to demystify the hesitations behind cloud security and analyzed the fast-growing transformation to a range of newer technical approaches with important consequences for legal practice. This month we continue the discussion by tackling the security and legal implications of the mass transformation of enterprise IT to cloud services from leading providers such as AWS and Azure.
Features

Cryptography's Legal Landscape
The same applications, and the same cryptographic protocols, don't function in the exact same ways when appearing in 'the same software' utilized in different control devices. What, if any, are the legal ramifications of differing delivery mechanisms for the same cryptographic functions that may or may not perform the same?
Features

In-House Counsel's Growing Role in Data Protection and Security Risk Management
<b><I>Building an Intelligence-Led Program</b></i><p>With reports of major breaches surfacing with alarming frequency, boards and C-Level management are now looking to counsel to implement programs that help the corporation prepare for, quickly recover and reduce fallout from, inevitable cyber incidents. In-house counsel is facing growing responsibility to minimize damage to the corporate reputation, loss of key data, and legal and regulatory penalties. And many worry their organization is stuck in a game of catch-up.
Features

The End of the Privacy Shield?
If the U.S. cannot come to an understanding with the European Parliament by September 1, companies that already participate in Privacy Shield may find themselves in limbo. But there are options.
Features

The Law Firm Cybersecurity Audit Grows Up
In the face of new threats, law firm cybersecurity assessments have become more engaging and demanding affairs. But many hope this new change is just the beginning of a more fundamental shift.
Features

'Competitive Intelligence:' Leveraging CI for Successful Business Development
<b><i>Sometimes You Don't Know What You Don't Know</b></i><p>Over the last decade, the definition of competitive intelligence has evolved to be about all of the data and information I have access to that helps to isolate and leverage my firm's competitive advantage and close the deal on business development opportunities. The more data available to analyze, the better informed your decisions and strategies will be going forward.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Blockchain Domains: New Developments for Brand OwnersBlockchain domain names offer decentralized alternatives to traditional DNS-based domain names, promising enhanced security, privacy and censorship resistance. However, these benefits come with significant challenges, particularly for brand owners seeking to protect their trademarks in these new digital spaces.Read More ›
- Professional Development: How to Be An Ally In the Legal ProfessionLast year law firms sent out announcements about their commitment to Diversity, Equity, and Inclusion (DEI) efforts in response to racial tensions. One of the initiatives firms stated they implemented is a formal allyship program. However, allyship in not a program or a mindset. It is a verb.Read More ›
- Supreme Court Rules Rejection of Trademark License Does Not Rescind Rights of LicenseeMission Product Holdings, Inc. v. Tempnology, LLC The question is whether a debtor's rejection of its agreement granting a license "terminates rights of the licensee that would survive the licensor's breach under applicable nonbankruptcy law."Read More ›
- A Look Behind, A Look Ahead: Part Two - E-DiscoveryPart Two of a Two-Part Article Cybersecurity Law & Strategy partnered with our ALM sibling Legaltech News to ask cybersecurity and e-discovery experts what they thought the key trends of 2019 and what they expect to see in 2020. Part Two looks at e-discovery.Read More ›