Features

Legal Tech: Summer 2020's Most Interesting E-Discovery Cases
Social Media & Cell Phones Still Represent an E-Discovery Battleground
Features

COVID-19 and Working Remotely: Embracing the Changes and the Challenges In a Pandemic
Experts share their experience and insight around workplace trends and the value of technology tools to drive productivity and engagement in a roundtable discussion.
Features

Cybersecurity for Remote Workers: Keeping Financial Information Secure
At the beginning of the COVID-19 pandemic, businesses scrambled to rapidly deploy a remote workforce which created new challenges for businesses to continue operating and providing critical services. It also created an opportunity for malicious actors to hack into and gain access to IT systems and sensitive, personal information.
Features

What's In a Name? Booking.com and Consumer Perception Evidence
In the first case in U.S. Supreme Court history argued by telephone, the Court on June 30, 2020 ruled 8-1 in favor of Booking.com holding that it could register as a trademark its eponymous domain name BOOKING.COM.
Features

Chief Legal Officers Taking Lead In Cybersecurity Policy, ACC Reports
In addition to helping make strategic business decisions, general counsel and chief legal officers are now often tasked with playing a leading part in a corporate cybersecurity and data privacy plan, according to the Association of Corporate Counsel's 2020 State of Cybersecurity Report.
Features

Legal Tech: Six Years of Tracking E-Discovery Trends and Providers
For the past six years, the E-Discovery Unfiltered report to identify pricing patterns and preferences in electronic discovery, highlight projected investments in the sector, gauge the impact of the cloud, track shifting preferences in outsourcing and remote review, understand vendor selection criteria, and focus on the need for international ediscovery, among other trends.
Features

Legal Tech: The Intersection of E-Discovery and Cybersecurity: You've Come a Long Way, Baby
Data is an asset and a liability. It fits into both accounting columns and will not fail to be used against a corporate entity if not secured properly. Databases contain trade secrets, personally identifiable information, HIPAA-protected health care information, proprietary information and classified data. As the size of databases grew and the importance of data became more evident, one thing became apparent: the information stored in those repositories had to be kept secure.
Features

Working Remotely? Here Are 4 Often-Overlooked Steps That Secure Your Data
By the time you read this, Americans will have been working from home for more than three months. This has never happened before in this country during the age of technology. As millions logged on to their home networks and personal devices in an attempt to keep their companies afloat, cybersecurity issues rose to the forefront of the many issues that companies had to manage.
Features

Synchronizing Legal Hold Requirements With Consumer Requests for Data Deletion
The biggest challenge with any legal hold process is ensuring that potentially relevant data is actually preserved. But with evolving requirements for how data is managed by new data privacy laws like the CCPA and the GDPR, it's become harder to secure data by simply sending a legal hold and assuming the custodian will do their duty to preserve it.
Features

Preparing for the LIBOR Phase Out: Contract Remediation Starts with Contract Intelligence
The London Interbank Offered Rate has long been the global basis for agreements that include a variable interest rate component. However, LIBOR would be replaced by other benchmarks by the end of 2021. Key to assessing risk of exposure, quantifying the financial impact, developing remediation plans and communicating material information to stakeholders will be the identification, analysis and remediation of LIBOR-based contracts.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Legal Possession: What Does It Mean?Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.Read More ›
- Players On the MoveA look at moves among attorneys, law firms, companies and other players in entertainment law.Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›