Features

It's Legalweek Time Again
This year, Legalweek will feature workshop boot camps, networking events, hundreds of exhibitors on the tradeshow floor and three conferences designed to address key issues at a functional level: LegalCIO, Legal Business Strategy, and, of course, Legaltech, the world's largest and longest running trade show for legal technology.
Features

Legal Tech: Babst Calland & Solvaire: An AI Contract Review Use Case
In today's business climate, clients demand greater efficiency when it comes to contract review for many complex deals and transactions. We have found that the combination of deep legal expertise, coupled with embracing carefully researched and vetted technology, is the most effective means of delivering high quality and timely review in an increasingly competitive marketplace.
Features

Digital Dive: New Report Reveals Opportunities for Improvement on Digital Marketing Strategy for Law Firms
For those of us who have devoted more years in legal marketing than we'd care to admit, it's heartening to see the field receiving the recognition it deserves. The demand for top talent has never been higher and marketing plans are getting more attention from firm management. Still, there is more work for law firms to do. That's particularly true in digital marketing.
Features

Supreme Court, Finally, Takes Up Google v. Oracle
The U.S. Supreme Court has jumped into a titanic copyright battle between Oracle Corp. and Google LLC with both barrels. The court's involvement is sure to reignite a 50-year-old debate over how much, if any, software should be subject to copyright, and the contours of the fair use defense in the digital age.
Features

Effectively Managing Increasing Client Security Requirements
Gone are the days of naively assuming our confidential data is secure. Increasingly, clients, stakeholders, regulators and others are demanding proof that firms are actively protecting the PII to which they have access, and this evidence is being demanded both before and after security incidents. It is imperative law firms have the positions and processes in place to handle security incidents with urgency, accuracy and completeness.
Features

Law Firms Enter the Golden Age of Data Mining
As a matter of practice, law firms generate and store incomprehensible amounts of data. Most, if not all, of that data has been digitized and many firms that recognize the untapped value of their data have begun to leverage sophisticated technologies to mine it for reusable work product and valuable insights.
Features

Can Artificial Intelligence Fix Security Issues?
There is great enthusiasm about what AI can do to promote better living conditions, evoking wisdom, providing business intelligence through deep analysis of behavior and habits, by signaling trends and anticipating demand. But there are other considerations as well. A critical one is cybersecurity.
Features

How the Healthcare Industry Can Fight Rising Cyber-Attacks
The healthcare industry is facing an alarming proliferation of cyber perils. Why? Because our healthcare system is a "soft target," and particularly vulnerable because of its lifesaving work, where time is of the essence. It's a recipe for disaster from a cybersecurity standpoint.
Features

Cybersecurity Experts Needed in U.S.
The Country Is In Dire Need of Experts Who Possess the Advanced Knowledge, Skills and Experience Required to Combat Cybersecurity Crimes In an effort to protect our financial, personal, medical, and otherwise confidential data, as well as our election systems, we need to continue to attract and employ the services of the most qualified cybersecurity experts from around the world. However, at present, there is a dire shortage of such qualified experts in the United States.
Features

Unique Cyber Risks Faced By the Cannabis Industry
All companies face cybersecurity threats, but the legalized cannabis industry's storage of personally identifiable information and reliance on seed-to-sale tracking software can place it firmly within hackers' crosshairs.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Second Circuit Rejects Arbitration of Debtor's Asserted Discharge ViolationA bankruptcy court properly denied a bank's motion to compel arbitration of a debtor's asserted violation of the court's discharge injunction, the U.S. Court of Appeals for the Second Circuit held.Read More ›
- Reining in the Inequitable Conduct DefenseResponding to views from the U.S. Patent and Trademark Office and elsewhere about the unintended consequences of the current inequitable conduct doctrine, a divided <i>en banc</i> Federal Circuit decision issued on May 25, 2011 adjusted the standard of the materiality element to make this defense harder to establish.Read More ›
- Judge Rules Shaquille O'Neal Will Face Securities Lawsuit for Promotion, Sale of NFTsA federal district court in Miami, FL, has ruled that former National Basketball Association star Shaquille O'Neal will have to face a lawsuit over his promotion of unregistered securities in the form of cryptocurrency tokens and that he was a "seller" of these unregistered securities.Read More ›
- Attachment and Perfection of Security InterestsThis article addresses common attachment and perfection problems raised in recent cases, and provides suggestions on how secured parties can avoid these pitfalls.Read More ›
- 'Customary Operations' or A Vacant Building?Many times, courts are faced with the question of whether a loss location is 'vacant' under a commercial property policy when trying to determine if the building owner or lessee is conducting customary operations. This article explores various decisions across the United States as to what is considered 'customary operations,' thereby rendering the property 'vacant.'Read More ›