• Data And Business Litigation

    Data retention is a double-edged sword. Data can be a treasure trove of evidence, notably in matters involving trade secrets and non-compete agreements, but in virtually any type of litigation. At the same time, data – holding...

    • Posted 4 days ago
    • 0
  • Cohen Wants Trump To Pay His Legal Fees, Judge Skeptical

    Former Trump attorney Michael Cohen’s attempt to get the Trump Organization to pay his legal fees ran into a skeptical judge at a hearing in a New York state court last week. Cohen wants the Trump Organization...

    • Posted 6 days ago
    • 0
  • Harnessing Market Forces To Confront Cyber Risk

    Corporations are currently not doing enough to address cyber risks, nor are those risks being addressed appropriately by the markets – specifically by investors, credit rating agencies and insurers – according an article from the Lawfare Institute....

    • Posted 1 week ago
    • 0
  • Supreme Court Changing Where You Can Be Sued

    In three decisions over the past five years, the Supreme Court has curtailed the power of U.S. courts over out-of-state and international defendants by restricting both general and specific jurisdiction. Litigation is being routed to where the...

    • Posted 3 weeks ago
    • 0
  • Every Adult In Bulgaria Hacked; Suspect Works For A Security Firm

    Following a hack of the Bulgarian tax authority, resulting in the theft of personal data on virtually every adult in the country, police arrested a Bulgarian cybersecurity expert who works for a US firm that specializes in...

    • Posted 4 weeks ago
    • 0
  • Make Sure Employees On The Stand Understand Privilege

    In a Fair Credit Reporting Act (FCRA) class action targeting 7-11, the plaintiffs wanted to see a slew of emails involving a company HR rep, the company’s in-house attorneys, and its outside law firm. The emails pertained...

    • Posted 4 weeks ago
    • 0
  • Cyber “Advanced Persistent Threats” Lurk Before Striking

    Some of the most insidious and sophisticated cyber attacks against organizations take the form of “Advanced Persistent Threats.” The key to how APTs work is stealth. An initial breach may employ conventional hacking strategies, like phishing or...

    • Posted 1 month ago
    • 0
  • Lawyer Gets 5 Years In Porn-Trolling Scam

    One of two former attorneys who orchestrated a porn trolling scheme has received a five-year sentence in federal court in Minnesota. He got a reduced sentence for cooperating in the prosecution of his partner, who got 14...

    • Posted 1 month ago
    • 0
  • Alternative Billing Appears To Be Mostly Talk

    Not for lack of encouragement from the corporate clients, but big law firms are not actually doing much alternative billing, according to an analysis from Bloomberg – even though about three out of four of the 100...

    • Posted 2 months ago
    • 0
  • Is “The Constitutional Question of the Twenty-First Century” Now Before The Ninth Circuit?

    According to one of the attorneys in the so-called climate kids’ lawsuit the answer is yes, and New Yorker writer Carolyn Kormann appears to be sympathetic. She concludes her article about the case with an excerpt from...

    • Posted 2 months ago
    • 0
Do NOT follow this link or you will be banned from the site!