This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
A breadth of topics captured my interests this week at Legal Talk Network. One more for my Goodreads wish list comes from The Modern Law Library. Host Lee Rawles speaks with historian Jane Dailey, the author of “ White Fright ” for an unfortunately timely and relevant discussion of lynch mobs. Rawles and Dailey discuss what a historical look at riotous groups can teach us about the Jan. 6 attack on the Capitol.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness.
On January 12, Judge James Boasberg of the U.S. District Court for the District of Columbia granted plaintiff Guo Wengui’s motion to compel production of a report (the “Report”)—and related materials—prepared by forensic vendor Duff & Phelps in Guo’s lawsuit against the law firm that formerly represented him, Clark Hill, PLC (the “Firm”). See Wengui v.
Finance teams find Trellis to be particularly effective in conducting comprehensive due diligence on both individuals and businesses. With our court data solution, financial experts can access critical litigation insights, making it an invaluable resource for informed decision-making in the financial sector.
In the first episode of 2021 we talk to a fellow podcaster and legal blogger Greg Lambert. He is co-host of the Geek in Review Podcast and also writes for Three Geeks and a Law Blog. Both the Three Geeks podcast and blog focus on legal innovation and change in the legal industry. Greg’s day job is Chief Knowledge Services Officer for the Dallas based law firm Jackson Walker.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness.
From Legal Calendaring to Case Valuation, How Excel Excels In this post, we'll show how Excel can help with two common tasks in litigation: (1) calendaring and calculating deadlines and (2) determining case valuation.
From Legal Calendaring to Case Valuation, How Excel Excels In this post, we'll show how Excel can help with two common tasks in litigation: (1) calendaring and calculating deadlines and (2) determining case valuation.
On January 12, 2021, the Federal Deposit Insurance Corporation (“FDIC”), the Office of the Comptroller of the Currency (“OCC”) and the Federal Reserve Board (“FRB”) (together the “Agencies”) published a notice of proposed rulemaking (“Proposed Rule”) that would significantly update the Agencies’ guidance on data breach response. The Proposed Rule would impose prompt reporting requirements on banking organizations and their service providers with respect to certain data breaches and other cyber e
Just a few days into 2021 came news that could end up being one of the biggest legal technology stories of the year. On Jan. 5, two leading legal research companies, Casemaker and Fastcase – two companies that have been rivals for as long as they’ve been in business – announced their merger. The combined company, which will operate under the Fastcase name, has a subscriber base estimated to be more than a million lawyers, or more than three quarters of the 1.3 million lawyers in the United Sta
From Legal Calendaring to Case Valuation, How Excel Excels In this post, we'll show how Excel can help with two common tasks in litigation: (1) calendaring and calculating deadlines and (2) determining case valuation.
On January 6, 2021, Avi Gesser and Anna Gressel from Debevoise’s Data Strategy and Security Group and Keith Slattery from Debevoise’s Insurance Group has an insightful conversation with Stefan Toi from Aon Cyber Solutions and Marcello Antonucci from Beazley on cyber insurance coverage and the gaps it may leave for the unique risks posed by artificial intelligence.
Speaker: Allison Mears, Adela Wekselblatt, and George Socha
Artificial intelligence is reshaping the legal industry, and paralegals are at the forefront of this transformation. As AI becomes more integrated into legal workflows, paralegals can streamline their daily tasks, enhance efficiency, and add greater value to their firms and organizations. But what exactly does AI mean for paralegals today—and how can you leverage it to your advantage?
Lost and Stolen Data and the Recovery Tips Losing data doesn’t always mean that your data is stolen, it happens due to various reasons. This article contains a visual guide (created by Secure Data Recovery) about the lost and stolen data, and the recovery tips along with some undeniable facts.
Lost and Stolen Data and the Recovery Tips Losing data doesn’t always mean that your data is stolen, it happens due to various reasons. This article contains a visual guide (created by Secure Data Recovery) about the lost and stolen data, and the recovery tips along with some undeniable facts.
Regulators in the United States and abroad are showing increasing interest in pursuing enforcement actions against companies that deploy artificial intelligence, machine learning, or algorithmic-based applications (“AI”) in a way that the regulators perceive as harmful to the public. These regulators expect transparent and comprehensive disclosures by companies regarding AI that can negatively affect clients or customers.
How To Spot a Malicious Email It is estimated that over 80% of emails sent each day is spam. Of that, a significant portion contains some sort of virus, phishing or malicious intent. Not only does this represent a major security risk, but unwanted and email also affects productivity and clogs your network. In the event that an email slides pass your spam filter, how can you tell whether it’s malicious?
Are there mysteries lurking in your family tree? 🕵 No, not a long-lost half-brother - I'm talking about a patent family tree! IP paralegals need fast and easy ways to verify and report on essential data about foreign equivalents of US assets. Join us to master the global scope of key assets to support prosecution, portfolio management, litigation, licensing, competitive monitoring and more!
How To Spot a Malicious Email It is estimated that over 80% of emails sent each day is spam. Of that, a significant portion contains some sort of virus, phishing or malicious intent. Not only does this represent a major security risk, but unwanted and email also affects productivity and clogs your network. In the event that an email slides pass your spam filter, how can you tell whether it’s malicious?
40
40
Input your email to sign up, or if you already have an account, log in here!
Enter your email address to reset your password. A temporary password will be e‑mailed to you.
We organize all of the trending information in your field so you don't have to. Join 5,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content