Features

Online Extra: Just How Far Will the Supreme Court's 'Carpenter' Opinion Reverberate?
The ruling restricting the collection of historical cell site location information (CSLI) without a warrant aims to be narrow in scope, but legal experts argue it may have repercussions for years to come.
Features

Legal Tech: Warning Signs of Subpar Tech Support
Your firm has identified an exciting new technology and done its due diligence. And then, you find yourself in the worst possible scenario: It turns out that the provider's technical support stinks. Here are some potential red flags that will help you evaluate a provider's technical support before you sign on the dotted line.
Features

'Professional Development:' Those Were the Days: Lessons from Silicon Valley's Marketing Culture
There were elements of the corporate culture in the early Dot-com years that helped shape my perspective on the critical role marketing could (and should) play in driving tangible and bottom-line business results. Those shaping influences, when applied to law firms, can help us legal marketers realize even greater returns for our internal and external clients.
Features

'Marketing Tech:' How Law Firms May Ensure Social Media Compliance
How can law firms ensure social media compliance? What are the rules and restrictions to creating profiles, publishing content and communicating with prospects and clients? This article answers these questions and provides tips to help firms create a sound social media policy.
Features

Security Breach Responses — As Important and Difficult As Ever
The confusing and conflicting world of contractual requirements and personal data security breach notification laws can add insult and expense to injury, and sometimes adds injury itself. Tough -- and sometimes expensive -- choices need to be made quickly.
Features

Protecting Privilege Before and After a Cyber Breach
Critical to any counsel working to prevent a cyber-attack or respond to a successful cyber intrusion is an understanding why and how to properly utilize both attorney-client and work-product privilege. The overriding principle of using privilege is straightforward: to protect your organization's investigation and breach response efforts from usage by third parties or regulatory agencies in litigation arising from a breach.
Features

This is Not Your Father's Cloud
<b><i>Part One of a Two-Part Article</b></i><p>Part One of this two-part article is aimed at demystifying the hesitations behind cloud security and analyzing the fast-growing transformation to a range of newer technical approaches with important consequences for legal practice.
Features

How Cyber Threats Affect Law Firm Marketers
Even though law firms don't generally manage retail-type websites, they are far from immune to cyber threats. In fact, firms are prime targets for cyber criminals.
Features

The Power of Certifications in Legal
<b><i>Part Two of a Two-Part Article</b></i><p>Professionals in e-discovery and privacy, including lawyers, are hungry for growth opportunities and may be ripe to transition into certain security-centric positions; however, the security job landscape is far more expansive and far less commoditized than ESI or privacy — for now. Part Two provides a road map for how certifications can assist an individual or an organization in reinventing, repurposing, creating or maintaining cybersecurity talents.
Features

Navigating the Fear and Promise of Artificial Intelligence
With the corpus of law data becoming ever-more complex and nuanced, the use of machine-assisted research and analysis is becoming more of a requirement, rather than an option, in the legal profession. Because of this, some have expressed fear that robot-lawyers will replace legal professionals.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- "Holy Fair Use, Batman": Copyright, Fair Use and the Dark KnightThe copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›