Sat.Jan 09, 2021 - Fri.Jan 15, 2021

article thumbnail

History of Lynch Mobs | A Chaotic News Cycle Rundown | LIBOR Under the Radar | Best/Worst in Legal Marketing?

Legal Talk Network

A breadth of topics captured my interests this week at Legal Talk Network. One more for my Goodreads wish list comes from The Modern Law Library. Host Lee Rawles speaks with historian Jane Dailey, the author of “ White Fright ” for an unfortunately timely and relevant discussion of lynch mobs. Rawles and Dailey discuss what a historical look at riotous groups can teach us about the Jan. 6 attack on the Capitol.

Lawyer 52
article thumbnail

Court Chips Away at Privilege Protections for Cyber Forensic Reports

Debevoise Data Blog

On January 12, Judge James Boasberg of the U.S. District Court for the District of Columbia granted plaintiff Guo Wengui’s motion to compel production of a report (the “Report”)—and related materials—prepared by forensic vendor Duff & Phelps in Guo’s lawsuit against the law firm that formerly represented him, Clark Hill, PLC (the “Firm”). See Wengui v.

Court 52
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Greg Lambert on the Importance of the 21st Century Law Librarian

Technically Legal

In the first episode of 2021 we talk to a fellow podcaster and legal blogger Greg Lambert. He is co-host of the Geek in Review Podcast and also writes for Three Geeks and a Law Blog. Both the Three Geeks podcast and blog focus on legal innovation and change in the legal industry. Greg’s day job is Chief Knowledge Services Officer for the Dallas based law firm Jackson Walker.

Law 52
article thumbnail

Pete Recommends – Weekly highlights on cyber security issues, January 10, 2020

LLRX

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness.

Court 73
article thumbnail

Legal Calendaring to Case Valuation

NSLT

From Legal Calendaring to Case Valuation, How Excel Excels In this post, we'll show how Excel can help with two common tasks in litigation: (1) calendaring and calculating deadlines and (2) determining case valuation.

article thumbnail

Banking Agencies Propose 36-Hour Data Breach Reporting Rules for Significant Incidents

Debevoise Data Blog

On January 12, 2021, the Federal Deposit Insurance Corporation (“FDIC”), the Office of the Comptroller of the Currency (“OCC”) and the Federal Reserve Board (“FRB”) (together the “Agencies”) published a notice of proposed rulemaking (“Proposed Rule”) that would significantly update the Agencies’ guidance on data breach response. The Proposed Rule would impose prompt reporting requirements on banking organizations and their service providers with respect to certain data breaches and other cyber e

article thumbnail

Ep 105: Leaders of Fastcase and Casemaker Discuss their Merger

LawNext podcast

Just a few days into 2021 came news that could end up being one of the biggest legal technology stories of the year. On Jan. 5, two leading legal research companies, Casemaker and Fastcase – two companies that have been rivals for as long as they’ve been in business – announced their merger. The combined company, which will operate under the Fastcase name, has a subscriber base estimated to be more than a million lawyers, or more than three quarters of the 1.3 million lawyers in the United Sta

More Trending

article thumbnail

Legal Calendaring to Case Valuation

NSLT

From Legal Calendaring to Case Valuation, How Excel Excels In this post, we'll show how Excel can help with two common tasks in litigation: (1) calendaring and calculating deadlines and (2) determining case valuation.

article thumbnail

Webcast — Cyber and AI Insurance – A Discussion with Stefan Toi of Aon Cyber Solutions and Marcello Antonucci of Beazley on Navigating Cyber Insurance Coverage and AI Gaps

Debevoise Data Blog

On January 6, 2021, Avi Gesser and Anna Gressel from Debevoise’s Data Strategy and Security Group and Keith Slattery from Debevoise’s Insurance Group has an insightful conversation with Stefan Toi from Aon Cyber Solutions and Marcello Antonucci from Beazley on cyber insurance coverage and the gaps it may leave for the unique risks posed by artificial intelligence.

article thumbnail

Prevent COVID Burn-Out: Embrace Family Time

Nota

52
article thumbnail

Lost and Stolen Data and the Recovery Tips

NSLT

Lost and Stolen Data and the Recovery Tips Losing data doesn’t always mean that your data is stolen, it happens due to various reasons. This article contains a visual guide (created by Secure Data Recovery) about the lost and stolen data, and the recovery tips along with some undeniable facts.

40
article thumbnail

Lost and Stolen Data and the Recovery Tips

NSLT

Lost and Stolen Data and the Recovery Tips Losing data doesn’t always mean that your data is stolen, it happens due to various reasons. This article contains a visual guide (created by Secure Data Recovery) about the lost and stolen data, and the recovery tips along with some undeniable facts.

40
article thumbnail

Regulatory Risks for Not Disclosing Trading Algorithms – Five Takeaways from the SEC’s $170 Million Settlement with BlueCrest Capital

Debevoise Data Blog

Regulators in the United States and abroad are showing increasing interest in pursuing enforcement actions against companies that deploy artificial intelligence, machine learning, or algorithmic-based applications (“AI”) in a way that the regulators perceive as harmful to the public. These regulators expect transparent and comprehensive disclosures by companies regarding AI that can negatively affect clients or customers.

article thumbnail

How to Spot a Malicious Email

NSLT

How To Spot a Malicious Email It is estimated that over 80% of emails sent each day is spam. Of that, a significant portion contains some sort of virus, phishing or malicious intent. Not only does this represent a major security risk, but unwanted and email also affects productivity and clogs your network. In the event that an email slides pass your spam filter, how can you tell whether it’s malicious?

40
article thumbnail

How to Spot a Malicious Email

NSLT

How To Spot a Malicious Email It is estimated that over 80% of emails sent each day is spam. Of that, a significant portion contains some sort of virus, phishing or malicious intent. Not only does this represent a major security risk, but unwanted and email also affects productivity and clogs your network. In the event that an email slides pass your spam filter, how can you tell whether it’s malicious?

40