Account

Sign in to access your account and subscription

Technology Media and Telecom

  • Your firm has identified an exciting new technology and done its due diligence. And then, you find yourself in the worst possible scenario: It turns out that the provider's technical support stinks. Here are some potential red flags that will help you evaluate a provider's technical support before you sign on the dotted line.

    July 01, 2018Joe Kelly
  • There were elements of the corporate culture in the early Dot-com years that helped shape my perspective on the critical role marketing could (and should) play in driving tangible and bottom-line business results. Those shaping influences, when applied to law firms, can help us legal marketers realize even greater returns for our internal and external clients.

    July 01, 2018David McCann
  • How can law firms ensure social media compliance? What are the rules and restrictions to creating profiles, publishing content and communicating with prospects and clients? This article answers these questions and provides tips to help firms create a sound social media policy.

    July 01, 2018Marguerita Cheng
  • The confusing and conflicting world of contractual requirements and personal data security breach notification laws can add insult and expense to injury, and sometimes adds injury itself. Tough -- and sometimes expensive -- choices need to be made quickly.

    June 01, 2018Bart A. Lazar
  • Critical to any counsel working to prevent a cyber-attack or respond to a successful cyber intrusion is an understanding why and how to properly utilize both attorney-client and work-product privilege. The overriding principle of using privilege is straightforward: to protect your organization's investigation and breach response efforts from usage by third parties or regulatory agencies in litigation arising from a breach.

    June 01, 2018Robert W. Anderson and Eric B. Levine
  • Part One of a Two-Part Article

    Part One of this two-part article is aimed at demystifying the hesitations behind cloud security and analyzing the fast-growing transformation to a range of newer technical approaches with important consequences for legal practice.

    June 01, 2018Adam Cohen
  • Even though law firms don't generally manage retail-type websites, they are far from immune to cyber threats. In fact, firms are prime targets for cyber criminals.

    June 01, 2018Melanie Trudeau
  • Part Two of a Two-Part Article

    Professionals in e-discovery and privacy, including lawyers, are hungry for growth opportunities and may be ripe to transition into certain security-centric positions; however, the security job landscape is far more expansive and far less commoditized than ESI or privacy — for now. Part Two provides a road map for how certifications can assist an individual or an organization in reinventing, repurposing, creating or maintaining cybersecurity talents.

    June 01, 2018Jared Coseglia
  • With the corpus of law data becoming ever-more complex and nuanced, the use of machine-assisted research and analysis is becoming more of a requirement, rather than an option, in the legal profession. Because of this, some have expressed fear that robot-lawyers will replace legal professionals.

    June 01, 2018Jeff Reihl and Rick McFarland