Features

<i>Legal Tech:</i> Four Lessons Learned from Exterro's 4th Annual Federal Judges Survey
For the fourth time, Exterro has conducted an in-depth survey of federal judges in order to understand better how they see e-discovery law and practice changing.
Features

Who Owns e-Discovery's Largest Companies?
A rundown of the owners of 14 large e-discovery companies. Here's a hint: A whole lot of private equity.
Features

<i>Online Extra:</i> Catalyst Acquires TotalDiscovery
The deal will primarily be used to expand Catalyst's core offering to offer an integrated program, Insight Discovery, that spans the EDRM.
Features

<i>Online Extra</i>: Equifax's Liabilities Pile on After Discovery of New Compromised Data
After discovering that 2.4 million of its customers had partial driver's license information stolen, Equifax will likely face renewed questions over the handling of its post-breach internal investigation.
Features

Benchmarking Cybersecurity: CISOs and Security Leaders Share Perspectives on Managing Evolving Global Risks
30 security professionals are interviewed in a collective conversation about the cross-functional solutions they are applying to today's most complex challenges and the creative ways they are adapting to a perilous threat landscape.
Features

Law Firm Security Goes Back to School
Armed with technical and regulatory weapons for preventing cyber crimes, law firms must administer policies to protect client data and use the systems and services held standard by industries like medicine and banking. No one knows when disruption will take place. New methods of adverse action force executives to make more choices and decisions. All departments must merge their vigilance and join with IT services as IT takes center stage in order to stay prepared.
Features

How Law Firms and Legal Departments Can Protect Against Meltdown and Spectre
In January, news of the Meltdown and Spectre vulnerabilities rocked the cybersecurity world. And even a few months later, the news is still reverberating, due to several patches that are significantly slowing down device and system performance. To learn more about these vulnerabilities and how law firms and legal departments can protect against them now and in in the future, I sat down with Dana Simberkoff, Chief Risk, Privacy and Information Security Officer at AvePoint.
Features

China's Cybersecurity Law Isn't Just About Cybersecurity
The law — which includes data localization mandates, cybersecurity best practices, and data transfer restrictions — has similarities to other cyber laws such as the EU's General Data Protection Regulation (GDPR). But in this case, it's also being used to police internet content and behavior.
Features

Supreme Court Asked, Again, to Weigh In on Data Breach Standing as Circuit Split Widens
CareFirst, a large health care company involved in a data breach case, asked the U.S. Supreme Court to weigh in on whether victims can establish Article III standing to sue for the risk of future identity theft. The Court denied the request, leaving intact a recent district court holding that consumers could successfully plead such a claim issue — and leaving a split among the federal appellate courts.
Features

Smart Contracts and Blockchain
As the entertainment industry continues to assess digital blockchain-distribution technology for tracking transactions, it's essential to consider the legal implications for smart-contracting and contract management.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›