Sat.Jan 09, 2021 - Fri.Jan 15, 2021

article thumbnail

Pete Recommends – Weekly highlights on cyber security issues, January 10, 2020

LLRX

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness.

Court 56
article thumbnail

Prevent COVID Burn-Out: Embrace Family Time

Nota

52
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Court Chips Away at Privilege Protections for Cyber Forensic Reports

Debevoise Data Blog

On January 12, Judge James Boasberg of the U.S. District Court for the District of Columbia granted plaintiff Guo Wengui’s motion to compel production of a report (the “Report”)—and related materials—prepared by forensic vendor Duff & Phelps in Guo’s lawsuit against the law firm that formerly represented him, Clark Hill, PLC (the “Firm”). See Wengui v.

Court 52
article thumbnail

History of Lynch Mobs | A Chaotic News Cycle Rundown | LIBOR Under the Radar | Best/Worst in Legal Marketing?

Legal Talk Network

A breadth of topics captured my interests this week at Legal Talk Network. One more for my Goodreads wish list comes from The Modern Law Library. Host Lee Rawles speaks with historian Jane Dailey, the author of “ White Fright ” for an unfortunately timely and relevant discussion of lynch mobs. Rawles and Dailey discuss what a historical look at riotous groups can teach us about the Jan. 6 attack on the Capitol.

Lawyer 52
article thumbnail

Case Closed: How to Optimize Your Legal Intake Process for Efficiency

Speaker: Anne Post, CEO North America, Xakia Technologies

Do you know that 40% of U.S. Legal Departments now have a formal legal intake process? With that in mind, where does your legal department stand today? Many legal teams still struggle with a flood of incoming requests, leaving everyone overwhelmed and frustrated. Implementing a formal legal intake process can seem like an obstacle between the business and the legal department, but it doesn’t have to be!

article thumbnail

Greg Lambert on the Importance of the 21st Century Law Librarian

Technically Legal

In the first episode of 2021 we talk to a fellow podcaster and legal blogger Greg Lambert. He is co-host of the Geek in Review Podcast and also writes for Three Geeks and a Law Blog. Both the Three Geeks podcast and blog focus on legal innovation and change in the legal industry. Greg’s day job is Chief Knowledge Services Officer for the Dallas based law firm Jackson Walker.

Law 52
article thumbnail

Pete Recommends – Weekly highlights on cyber security issues, January 10, 2021

LLRX

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness.

Court 45

More Trending

article thumbnail

Legal Calendaring to Case Valuation

NSLT

From Legal Calendaring to Case Valuation, How Excel Excels In this post, we'll show how Excel can help with two common tasks in litigation: (1) calendaring and calculating deadlines and (2) determining case valuation.

article thumbnail

Ep 105: Leaders of Fastcase and Casemaker Discuss their Merger

LawNext podcast

Just a few days into 2021 came news that could end up being one of the biggest legal technology stories of the year. On Jan. 5, two leading legal research companies, Casemaker and Fastcase – two companies that have been rivals for as long as they’ve been in business – announced their merger. The combined company, which will operate under the Fastcase name, has a subscriber base estimated to be more than a million lawyers, or more than three quarters of the 1.3 million lawyers in the United Sta

article thumbnail

Legal Calendaring to Case Valuation

NSLT

From Legal Calendaring to Case Valuation, How Excel Excels In this post, we'll show how Excel can help with two common tasks in litigation: (1) calendaring and calculating deadlines and (2) determining case valuation.

article thumbnail

Webcast — Cyber and AI Insurance – A Discussion with Stefan Toi of Aon Cyber Solutions and Marcello Antonucci of Beazley on Navigating Cyber Insurance Coverage and AI Gaps

Debevoise Data Blog

On January 6, 2021, Avi Gesser and Anna Gressel from Debevoise’s Data Strategy and Security Group and Keith Slattery from Debevoise’s Insurance Group has an insightful conversation with Stefan Toi from Aon Cyber Solutions and Marcello Antonucci from Beazley on cyber insurance coverage and the gaps it may leave for the unique risks posed by artificial intelligence.

article thumbnail

Trellis Launches Trellis AI to Streamline Trial Court Litigation

Trellis AI leverages the largest repository of state trial court data to help litigators evaluate cases, automate brief drafting, suggest winning strategies, and more. Key components: Draft Arguments — Uses similar/successful motions in the Trellis database to generate arguments/citations for your motions seeking dismissal, summary judgment, etc. Case Assessment — Predict the likely outcomes of a case at any stage to help you decide to accept it, guide motion practice, make settlement offers, an

article thumbnail

Lost and Stolen Data and the Recovery Tips

NSLT

Lost and Stolen Data and the Recovery Tips Losing data doesn’t always mean that your data is stolen, it happens due to various reasons. This article contains a visual guide (created by Secure Data Recovery) about the lost and stolen data, and the recovery tips along with some undeniable facts.

40
article thumbnail

Lost and Stolen Data and the Recovery Tips

NSLT

Lost and Stolen Data and the Recovery Tips Losing data doesn’t always mean that your data is stolen, it happens due to various reasons. This article contains a visual guide (created by Secure Data Recovery) about the lost and stolen data, and the recovery tips along with some undeniable facts.

40
article thumbnail

Regulatory Risks for Not Disclosing Trading Algorithms – Five Takeaways from the SEC’s $170 Million Settlement with BlueCrest Capital

Debevoise Data Blog

Regulators in the United States and abroad are showing increasing interest in pursuing enforcement actions against companies that deploy artificial intelligence, machine learning, or algorithmic-based applications (“AI”) in a way that the regulators perceive as harmful to the public. These regulators expect transparent and comprehensive disclosures by companies regarding AI that can negatively affect clients or customers.

article thumbnail

How to Spot a Malicious Email

NSLT

How To Spot a Malicious Email It is estimated that over 80% of emails sent each day is spam. Of that, a significant portion contains some sort of virus, phishing or malicious intent. Not only does this represent a major security risk, but unwanted and email also affects productivity and clogs your network. In the event that an email slides pass your spam filter, how can you tell whether it’s malicious?

40
article thumbnail

Visibility Into the Strategy & Supporting Documents of Major US Law Firms

Law Firm Intelligence by Trellis aggregates state trial court data across the Trellis platform enabling users to: look up a particular metric related to a specific law firm (such as, how many cases a law firm had or has against another law firm), and see the actual dockets and documents supporting the metric. Trellis data is maximized in a revolutionary and unique way to provide users an exclusive look into a law firm litigating in state trial courts.

article thumbnail

How to Spot a Malicious Email

NSLT

How To Spot a Malicious Email It is estimated that over 80% of emails sent each day is spam. Of that, a significant portion contains some sort of virus, phishing or malicious intent. Not only does this represent a major security risk, but unwanted and email also affects productivity and clogs your network. In the event that an email slides pass your spam filter, how can you tell whether it’s malicious?

40