Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

<b><i>Online Extra</b></i><br>Financial Industry Groups Slam NY's Proposed Cybersecurity Rules Image

<b><i>Online Extra</b></i><br>Financial Industry Groups Slam NY's Proposed Cybersecurity Rules

Joel Stashenko

Major banking and insurance industry groups are attacking New York's proposed regulation requiring member companies to adopt stringent protections against cyberattacks that compromise consumers' confidential information.

Features

Managing Risk in Light of 'Shadow IT' Image

Managing Risk in Light of 'Shadow IT'

David Ray

Information Governance in the Age of Cloud Application Proliferation

Features

Law Firms, Meet Your New Regulator: Your Clients Image

Law Firms, Meet Your New Regulator: Your Clients

Mark Sangster

While major banks, retailers, hospitals and insurance companies were the brick and mortar of a growing media monument to hubris and cyber overconfidence, law firm breaches went mostly unnoticed. That is, until government agencies and law enforcement grew concerned that the wealth of intellectual property curated by law firms could be used to manipulate financial markets by front running trades.

Features

Client Document Security Audits: Is Your Law Firm Ready? Image

Client Document Security Audits: Is Your Law Firm Ready?

Alvin Tedjamulia

It is essential for all law firms to safeguard their clients' documents against ever-evolving threats and thoroughly understand the security challenges and potential solutions in today's demanding world of legal document compliance.

Features

Looking to the FFIEC Revised Information Security Booklet for Best Practices in Data Security for Financial Institutions Image

Looking to the FFIEC Revised Information Security Booklet for Best Practices in Data Security for Financial Institutions

Craig Nazzaro

The Federal Financial Institutions Examination Council (FFIEC) recently revised its Information Security Booklet. The changes bring the financial services industry closer to the goal of having a clearly defined set of cybersecurity and data protection protocols to ensure regulatory compliance.

Features

Legal Tech: e-Discovery: Judge Says 'NO' to Party's Bid to Force Use of Predictive Coding Image

Legal Tech: e-Discovery: Judge Says 'NO' to Party's Bid to Force Use of Predictive Coding

By H. Christopher Boehning & Daniel J. Toal

Would Judge Peck's admiration and advocacy for predictive coding lead him, upon a request by the opposing party, to force a responding party to use it against that party's own wishes? Judge Peck recently faced this issue, putting potential use of predictive coding at odds with established precedent and procedure regarding how to conduct discovery.

Features

Introducing the Cybersecurity Reference Model Image

Introducing the Cybersecurity Reference Model

Jared Coseglia

When EDRM and CSRM Collide, Much Is Illuminated About the Hiring Trends in Both e-Discovery and Cybersecurity

Features

Moving from Good Law to Great Law™ Image

Moving from Good Law to Great Law™

James A. Durham

Law firm leadership is at a proverbial fork in the road. The people running law firms can continue to do business as usual, or they can lead their firms toward a model of business that reflects the new and still evolving client expectations and market demands.

Features

Culture of Collaboration Image

Culture of Collaboration

Peter Ozolin

<b><i>Optimal Insights Through Inter-Departmental Initiatives</b></i><p><p>As dizzying amounts of resources and the need for the timeliest insights grow, the conduit and collaboration between business development and an organization's information management department, especially, becomes more critical than ever.

Features

Sixth Circuit's Decision on Privacy Claims over Data Breaches Image

Sixth Circuit's Decision on Privacy Claims over Data Breaches

By Shari Claire Lewis

Data breaches such as the one Yahoo recently revealed (500 million accounts!) get the big headlines. In response, large companies double down on their efforts to protect the security of their data. But small to midsize businesses often fail to appreciate the risk of a data breach to their own business.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Coverage Issues Stemming from Dry Cleaner Contamination Suits
    In recent years, there has been a growing number of dry cleaners claiming to be "organic," "green," or "eco-friendly." While that may be true with respect to some, many dry cleaners continue to use a cleaning method involving the use of a solvent called perchloroethylene, commonly known as perc. And, there seems to be an increasing number of lawsuits stemming from environmental problems associated with historic dry cleaning operations utilizing this chemical.
    Read More ›
  • The Flight to Quality and Workplace Experience
    That the pace of change is "accelerating" is surely an understatement. What seemed almost a near certainty a year ago — that law firms would fully and permanently embrace work-from-home — is experiencing a seeming reversal. While many firms have, in fact, embraced hybrid operations, the meaning of hybrid has evolved from "office optional," to an average required 2 days a week, to now many firms coming out with four-day work week mandates — this time, with teeth.
    Read More ›
  • AI or Not To AI: Observations from Legalweek NY 2023
    This year at Legalweek, there was little doubt on what the annual takeaway topic would be. As much as I tried to avoid it for fear of beating the proverbial dead horse, it was impossible not to talk about generative AI, ChatGPT, and all that goes with it. Some fascinating discussions were had and many aspects of AI were uncovered.
    Read More ›
  • The Powerful Impact of The Non-Foreclosure Notice of Pendency
    RPAPL ' 1331 and RPAPL ' 1403 Notices of Pendency are requisite elements for foreclosing a mortgage. <i>See, Chiarelli v. Kotsifos</i>, 5 A.D.3d 345 (a notice of pendency is a prerequisite to obtaining a judgment in a mortgage foreclosure action); <i>Campbell v. Smith</i>, 309 A.D.2d 581, 582 (a notice of pendency is required in a foreclosure action under RPAPL Article 13). In contrast, an ex parte CPLR Article 65 Notice of Pendency (the "Notice") is not required but it is a significant tool in an action claiming title to, or an interest in or the use or enjoyment of, another's land. The filer does not have to make a meritorious showing or post a bond. Article 65 provides mechanisms for the defendant-owner to vacate the Notice that caused an unilaterally imposed restraint on its realty. But, recent case law establishes the near futility of such efforts if the plaintiff has satisfied the minimal statutory requisites for filing the Notice.
    Read More ›