NEXT

Ssalkin

Ssalkin

September 14, 2018 | Law.com

Law Firms: You Can't Buy Yourself Out Of Risk

A survey of more than 160 law firm executives (from medium to large firms) found that law firms are among some of the highest spenders on security yet were susceptible to some of the most common risks. And the issue will grow over the coming years as the demands of the business drive the adoption of emerging technologies, such as cloud and Artificial Intelligence (AI).

By Mark Sangster

6 minute read

September 11, 2018 | Law.com

The Price to Pay for <i>De Novo</i> Review of PTO Decisions

NantKwest v Iancu

The Federal Circuit sitting en banc reversed its own prior ruling and held that “all expenses of the proceeding” does not include attorneys' fees.

By Jonathan Moskin

12 minute read

September 06, 2018 | Law.com

<i>Cybersecurity Roundtable:</i> Chicago's Tech Experts Answer Three Critical Cybersecurity Questions

Earlier this summer a group of security-minded executives in Chicago, long a hub for legal and financial tech, sat down for a panel discussion on anticipating and combatting cybercrime.

By Adam Schlagman

9 minute read

September 05, 2018 | Law.com

<i>Case Study:</i> How Momkus McCluskey Virtualized Its IT for Better Security and Productivity 

Whatever direction we went with our IT, we wanted to make sure we would be following the absolute best practices from a security perspective. I needed to know that our data would be safe, secure, as well as fully backed up in case something went wrong.

By Jennifer Friedland

8 minute read

August 10, 2018 | Law.com

Measuring Success in Cybersecurity

Cybersecurity concerns are akin to health concerns. You can practice a healthy lifestyle; you can get regular medical check-ups; you can be vigilant in monitoring your own body. Still, the question remains, “How do I know I'm healthy?” The answer is, “You don't.”

By Chris Moschovitis

11 minute read

August 08, 2018 | Law.com

Protecting Privilege Before and After a Cyber Breach

Critical to any counsel working to prevent a cyber attack or respond to a successful cyber intrusion is an understanding of why and how to properly utilize both attorney-client and work-product privilege.

By Robert W. Anderson and Eric B. Levine

1 minute read

August 07, 2018 | Law.com

Firm Culture As Your Competitive Recruiting and Engagement Advantage

Future attorneys are seeking the right place to launch their careers; therefore, by promoting your firm's unique culture, you can more effectively attract and retain the best talent for your firm.

By Sharon Meit Abrahams

1 minute read

August 03, 2018 | Law.com

Foreign Lost Profits Recoverable for Patent Damages

The U.S. Supreme Court recently held that a patent owner may recover lost foreign profits for infringement. The holding in WesternGeco LLC v. ION Geophysical rejects the Federal Circuit's categorical exclusion of lost profits damages for foreign sales, and expands the potential for increased damages from domestic competitors operating in foreign markets.

By Elizabeth B. Hagan

2 minute read

August 01, 2018 | Law.com

General Data Protection Regulation: Defense or Offense?

Ostensibly, GDPR's mission is to strengthen and unify the EU's protection of online privacy rights and promote data protection for citizens of the 28 countries currently in the EU. In the global economy, however, GDPR serves as an alarm to all countries with business flowing across Europe and well beyond. Where business flows, data follow.

By Nina Cunningham

2 minute read

July 13, 2018 | Law.com

Creating a Collaborative Work Environment

Collaborative cultures soar in profitability, talent acquisition and retention, client retention and client service.

By Silvia Coulter

2 minute read