Features

Law Firms at a Crossroads: The New Paths to Safeguarding Data as Attacks Ramp Up
How do you protect your firm? The vast majority of cyber-related vulnerabilities can be traced to staff and third parties who accidentally or deliberately don't follow security protocols or are tricked into downloading malicious code.
Features

Retail Leads the Way in Data Breaches — Here's How to Protect Your Customers
If 2017 was considered the “year of the data breach” as the number of incidents hit a new record high of 1,579, 2018 might get even more serious. Just a little more than halfway through 2018, the number and scale of data breaches that have already been reported is staggering.
Features

Cybersecurity Roundtable: Chicago's Tech Experts Answer Three Critical Cybersecurity Questions
Earlier this summer a group of security-minded executives in Chicago, long a hub for legal and financial tech, sat down for a panel discussion on anticipating and combatting cybercrime.
Features

Law Firms: You Can't Buy Yourself Out Of Risk
A survey of more than 160 law firm executives (from medium to large firms) found that law firms are among some of the highest spenders on security yet were susceptible to some of the most common risks. And the issue will grow over the coming years as the demands of the business drive the adoption of emerging technologies, such as cloud and Artificial Intelligence (AI).
Features

Securing Each Link in the e-Discovery Chain
Cloud service providers to the federal government must meet the rigorous requirements of the Federal Risk and Authorization Management Program. FedRAMP, as it's known, is designed to help federal agencies follow the government's “cloud first” policy, and includes detailed and strict encryption and other cybersecurity requirements.
Features

Blockchain Will Bring Opportunities, Challenges to Legal Discovery
As more and more data is in blockchains, attorneys will have to interact with it. Blockchain will also become part of litigation without being the central focus as systems move to blockchain implementation. Attorneys will have to take note.
Features

Legal Tech: Early 2018 E-Discovery Case Law Review: Sanctions and the Reasonableness of TAR
Cases from early 2018 that stand above many others for the impact they will have on both sanctions and e-discovery review processes moving forward.
Features

Get Ready for California's Version of the EU General Data Protection Regulation
The entertainment industry is intensely focused on data collection and analytics as it seeks to maximize the exploitation of digital content. Just as those of us in the privacy field had begun to have a slight breather as much of the heavy lifting on the GDPR was finally behind us, lawmakers in California have passed the California Consumer Privacy Act of 2018 (CCPA).
Features

<i>Decision of Note:</i> Sound Recordings Remasters Don't Get Federal Copyright Protection
With an assist from Toucan Sam and Tony Bennett, owners of pre-1972 sound recordings no longer have to worry about losing their common law…
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- Legal Possession: What Does It Mean?Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›