Sat.Jan 09, 2021 - Fri.Jan 15, 2021

article thumbnail

History of Lynch Mobs | A Chaotic News Cycle Rundown | LIBOR Under the Radar | Best/Worst in Legal Marketing?

Legal Talk Network

A breadth of topics captured my interests this week at Legal Talk Network. One more for my Goodreads wish list comes from The Modern Law Library. Host Lee Rawles speaks with historian Jane Dailey, the author of “ White Fright ” for an unfortunately timely and relevant discussion of lynch mobs. Rawles and Dailey discuss what a historical look at riotous groups can teach us about the Jan. 6 attack on the Capitol.

Lawyer 52
article thumbnail

Court Chips Away at Privilege Protections for Cyber Forensic Reports

Debevoise Data Blog

On January 12, Judge James Boasberg of the U.S. District Court for the District of Columbia granted plaintiff Guo Wengui’s motion to compel production of a report (the “Report”)—and related materials—prepared by forensic vendor Duff & Phelps in Guo’s lawsuit against the law firm that formerly represented him, Clark Hill, PLC (the “Firm”). See Wengui v.

Court 52
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Greg Lambert on the Importance of the 21st Century Law Librarian

Technically Legal

In the first episode of 2021 we talk to a fellow podcaster and legal blogger Greg Lambert. He is co-host of the Geek in Review Podcast and also writes for Three Geeks and a Law Blog. Both the Three Geeks podcast and blog focus on legal innovation and change in the legal industry. Greg’s day job is Chief Knowledge Services Officer for the Dallas based law firm Jackson Walker.

Law 52
article thumbnail

Pete Recommends – Weekly highlights on cyber security issues, January 10, 2020

LLRX

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness.

Court 73
article thumbnail

Trellis Launches Trellis AI to Streamline Trial Court Litigation

Trellis AI leverages the largest repository of state trial court data to help litigators evaluate cases, automate brief drafting, suggest winning strategies, and more. Key components: Draft Arguments — Uses similar/successful motions in the Trellis database to generate arguments/citations for your motions seeking dismissal, summary judgment, etc. Case Assessment — Predict the likely outcomes of a case at any stage to help you decide to accept it, guide motion practice, make settlement offers, an

article thumbnail

Legal Calendaring to Case Valuation

NSLT

From Legal Calendaring to Case Valuation, How Excel Excels In this post, we'll show how Excel can help with two common tasks in litigation: (1) calendaring and calculating deadlines and (2) determining case valuation.

article thumbnail

Banking Agencies Propose 36-Hour Data Breach Reporting Rules for Significant Incidents

Debevoise Data Blog

On January 12, 2021, the Federal Deposit Insurance Corporation (“FDIC”), the Office of the Comptroller of the Currency (“OCC”) and the Federal Reserve Board (“FRB”) (together the “Agencies”) published a notice of proposed rulemaking (“Proposed Rule”) that would significantly update the Agencies’ guidance on data breach response. The Proposed Rule would impose prompt reporting requirements on banking organizations and their service providers with respect to certain data breaches and other cyber e

More Trending

article thumbnail

Pete Recommends – Weekly highlights on cyber security issues, January 10, 2021

LLRX

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness.

Court 45
article thumbnail

Legal Calendaring to Case Valuation

NSLT

From Legal Calendaring to Case Valuation, How Excel Excels In this post, we'll show how Excel can help with two common tasks in litigation: (1) calendaring and calculating deadlines and (2) determining case valuation.

article thumbnail

Webcast — Cyber and AI Insurance – A Discussion with Stefan Toi of Aon Cyber Solutions and Marcello Antonucci of Beazley on Navigating Cyber Insurance Coverage and AI Gaps

Debevoise Data Blog

On January 6, 2021, Avi Gesser and Anna Gressel from Debevoise’s Data Strategy and Security Group and Keith Slattery from Debevoise’s Insurance Group has an insightful conversation with Stefan Toi from Aon Cyber Solutions and Marcello Antonucci from Beazley on cyber insurance coverage and the gaps it may leave for the unique risks posed by artificial intelligence.

article thumbnail

Prevent COVID Burn-Out: Embrace Family Time

Nota

52
article thumbnail

Visibility Into the Strategy & Supporting Documents of Major US Law Firms

Law Firm Intelligence by Trellis aggregates state trial court data across the Trellis platform enabling users to: look up a particular metric related to a specific law firm (such as, how many cases a law firm had or has against another law firm), and see the actual dockets and documents supporting the metric. Trellis data is maximized in a revolutionary and unique way to provide users an exclusive look into a law firm litigating in state trial courts.

article thumbnail

Lost and Stolen Data and the Recovery Tips

NSLT

Lost and Stolen Data and the Recovery Tips Losing data doesn’t always mean that your data is stolen, it happens due to various reasons. This article contains a visual guide (created by Secure Data Recovery) about the lost and stolen data, and the recovery tips along with some undeniable facts.

40
article thumbnail

Lost and Stolen Data and the Recovery Tips

NSLT

Lost and Stolen Data and the Recovery Tips Losing data doesn’t always mean that your data is stolen, it happens due to various reasons. This article contains a visual guide (created by Secure Data Recovery) about the lost and stolen data, and the recovery tips along with some undeniable facts.

40
article thumbnail

Regulatory Risks for Not Disclosing Trading Algorithms – Five Takeaways from the SEC’s $170 Million Settlement with BlueCrest Capital

Debevoise Data Blog

Regulators in the United States and abroad are showing increasing interest in pursuing enforcement actions against companies that deploy artificial intelligence, machine learning, or algorithmic-based applications (“AI”) in a way that the regulators perceive as harmful to the public. These regulators expect transparent and comprehensive disclosures by companies regarding AI that can negatively affect clients or customers.

article thumbnail

How to Spot a Malicious Email

NSLT

How To Spot a Malicious Email It is estimated that over 80% of emails sent each day is spam. Of that, a significant portion contains some sort of virus, phishing or malicious intent. Not only does this represent a major security risk, but unwanted and email also affects productivity and clogs your network. In the event that an email slides pass your spam filter, how can you tell whether it’s malicious?

40
article thumbnail

Stay On Top of Newly Filed State & Federal Litigation: Curated Just for You!

With Daily Filings Report by Trellis you will receive an email and csv file daily with all new cases filed in the jurisdictions you're tracking. Each new case will include all case metadata like judge, parties, counsel, practice area, and even direct links to the full docket and complaint. Trellis Daily Filings Reports provide direct access to newly filed state and federal litigation curated just for you.

article thumbnail

How to Spot a Malicious Email

NSLT

How To Spot a Malicious Email It is estimated that over 80% of emails sent each day is spam. Of that, a significant portion contains some sort of virus, phishing or malicious intent. Not only does this represent a major security risk, but unwanted and email also affects productivity and clogs your network. In the event that an email slides pass your spam filter, how can you tell whether it’s malicious?

40