September 14, 2018 | Law.com
Law Firms: You Can't Buy Yourself Out Of RiskA survey of more than 160 law firm executives (from medium to large firms) found that law firms are among some of the highest spenders on security yet were susceptible to some of the most common risks. And the issue will grow over the coming years as the demands of the business drive the adoption of emerging technologies, such as cloud and Artificial Intelligence (AI).
By Mark Sangster
6 minute read
September 11, 2018 | Law.com
The Price to Pay for <i>De Novo</i> Review of PTO DecisionsNantKwest v Iancu
The Federal Circuit sitting en banc reversed its own prior ruling and held that “all expenses of the proceeding” does not include attorneys' fees.
By Jonathan Moskin
12 minute read
September 06, 2018 | Law.com
<i>Cybersecurity Roundtable:</i> Chicago's Tech Experts Answer Three Critical Cybersecurity QuestionsEarlier this summer a group of security-minded executives in Chicago, long a hub for legal and financial tech, sat down for a panel discussion on anticipating and combatting cybercrime.
By Adam Schlagman
9 minute read
September 05, 2018 | Law.com
<i>Case Study:</i> How Momkus McCluskey Virtualized Its IT for Better Security and ProductivityWhatever direction we went with our IT, we wanted to make sure we would be following the absolute best practices from a security perspective. I needed to know that our data would be safe, secure, as well as fully backed up in case something went wrong.
By Jennifer Friedland
8 minute read
August 10, 2018 | Law.com
Measuring Success in CybersecurityCybersecurity concerns are akin to health concerns. You can practice a healthy lifestyle; you can get regular medical check-ups; you can be vigilant in monitoring your own body. Still, the question remains, “How do I know I'm healthy?” The answer is, “You don't.”
By Chris Moschovitis
11 minute read
August 08, 2018 | Law.com
Protecting Privilege Before and After a Cyber BreachCritical to any counsel working to prevent a cyber attack or respond to a successful cyber intrusion is an understanding of why and how to properly utilize both attorney-client and work-product privilege.
By Robert W. Anderson and Eric B. Levine
1 minute read
August 07, 2018 | Law.com
Firm Culture As Your Competitive Recruiting and Engagement AdvantageFuture attorneys are seeking the right place to launch their careers; therefore, by promoting your firm's unique culture, you can more effectively attract and retain the best talent for your firm.
By Sharon Meit Abrahams
1 minute read
August 03, 2018 | Law.com
Foreign Lost Profits Recoverable for Patent DamagesThe U.S. Supreme Court recently held that a patent owner may recover lost foreign profits for infringement. The holding in WesternGeco LLC v. ION Geophysical rejects the Federal Circuit's categorical exclusion of lost profits damages for foreign sales, and expands the potential for increased damages from domestic competitors operating in foreign markets.
By Elizabeth B. Hagan
2 minute read
August 01, 2018 | Law.com
General Data Protection Regulation: Defense or Offense?Ostensibly, GDPR's mission is to strengthen and unify the EU's protection of online privacy rights and promote data protection for citizens of the 28 countries currently in the EU. In the global economy, however, GDPR serves as an alarm to all countries with business flowing across Europe and well beyond. Where business flows, data follow.
By Nina Cunningham
2 minute read
July 13, 2018 | Law.com
Creating a Collaborative Work EnvironmentCollaborative cultures soar in profitability, talent acquisition and retention, client retention and client service.
By Silvia Coulter
2 minute read
Trending Stories