News & Analysis as of

Email Software

Nextpoint, Inc.

How to Use Deposition Transcripts to Build Your Case Story

Nextpoint, Inc. on

Use the right tools to analyze your deposition transcripts and build a winning case story. As we mentioned in Part 1, there are many important tasks and responsibilities involved in a litigation matter, but telling a...more

NAVEX

Immediate vs. Slow Burn Risks: A Balanced Cybersecurity Strategy

NAVEX on

The consequences of a cyberattack can be catastrophic, as we saw in the previous blog of this series. Cybersecurity is a business-wide responsibility that demands a proactive strategy extending far beyond technical solutions...more

Guidepost Solutions LLC

Cyber Bullets for Small Law Firms

In our rapidly evolving digital landscape, all organizations are facing an onslaught of cybersecurity threats. According to recent research, victims of cyber attacks paid out a record $1.1 billion last year and have already...more

Mitratech Holdings, Inc

6 Ways Email & Spreadsheets Fall Short For Immigration Case Management

Managing immigration cases can be a complex and time-consuming process. With numerous documents, forms, deadlines, and client communication to juggle, relying on traditional methods like email and spreadsheets fall short....more

Proskauer on Privacy

Privacy Class Action Spotlight: Latest Wave of Wiretap Class Actions Continues Despite Dismissals as Plaintiffs Try New Approaches

Proskauer on Privacy on

Over a hundred cases are pending from the wave of privacy class actions that commenced last year alleging violations of state wiretap statutes based on use of website session replay, chatbot and pixel technologies. ...more

BakerHostetler

Threat Actors Target Academic Researchers in Phishing Schemes

BakerHostetler on

The FBI has announced that university aerospace researchers, both foreign and in the U.S., have become a target of a specific phishing scheme that is being conducted by threat actors. Specifically, researchers with access to...more

K2 Integrity

Cybersecurity Awareness Month: Evading Phishing Attacks

K2 Integrity on

This article concludes K2 Integrity’s mini-series promoting the importance of Cybersecurity Awareness Month. Throughout October, we have been providing tips and solutions to organizations to commemorate the 20-year...more

Bracewell LLP

Personal Devices and Messaging Platforms in the Workplace: Tips, Tactics and Best Practices for In-House Counsel

Bracewell LLP on

Federal regulators have cracked down on the use of texts messages and messaging platforms for business communications, using their broad authority to root out record retention violations, resulting in significant fines and...more

Cornerstone Research

5 Questions with Mike DeCesaris: Extracting Meaningful Insights from Unstructured Data

Cornerstone Research on

5 Questions is a periodic feature produced by Cornerstone Research, which asks our professionals, senior advisors, or affiliated experts to answer five questions. We interview Mike DeCesaris, vice president of Cornerstone...more

Nextpoint, Inc.

3 Reasons Why Microsoft Outlook is NOT a Document Review Tool

Nextpoint, Inc. on

Conducting ediscovery in Outlook may be tempting – but although it’s a free and familiar tool, it carries risks and limitations for document review. Email continues to be the primary source of electronic evidence in...more

Nextpoint, Inc.

The Key to Curbing Cost Pressures of Big Data

Nextpoint, Inc. on

Cost pressures from big data in ediscovery have made this often-overlooked process essential in modern litigation. Legal data volumes have exploded in our modern digital age – which can translate to huge cost increases...more

Good2bSocial

Top 8 Marketing Automation Tools for Law Firms in 2022

Good2bSocial on

Marketing automation refers to the use of software and other technologies to automate repetitive tasks and improve the effectiveness of online marketing, including email, social media, websites, and any content you publish....more

Linda Liu & Partners

China’s Security Assessment Measures for Outbound Data Transfers and Understanding on the Application Guidelines

Linda Liu & Partners on

The much-anticipated Security Assessment Measures for Outbound Data Transfers (hereinafter referred to as "the Measures") of China has already come into effect on September 1, 2022, and on the eve of the effective date, the...more

Robinson+Cole Data Privacy + Security Insider

CISA + MS-ISAC Alert: Threat Actors Exploiting Zimbra Collaboration Suite

On August 16, 2022, CISA (the Cybersecurity and Infrastructure Security Agency) and the Multi-State Information Sharing & Analysis Center (MS-ISAC) issued an Alert outlining multiple Common Vulnerabilities and Exposures...more

Mitratech Holdings, Inc

10 Questions to Ask Before Selecting an Immigration Case Management System (CMS) for U.S. Case Processing

With hundreds of immigration forms to track— and more appearing under new legislation consistently— a case management system (CMS) is a software that can help organizations ensure quick and hassle-free immigration compliance...more

Fox Rothschild LLP

The 9th Circuit Reversed a Consumer Wiretapping Dismissal Involving the Use of Session Replay Software. Does It Change Anything?

Fox Rothschild LLP on

Anyone following consumer privacy trends is likely aware of the wave of consumer litigations filed against website owners/operators alleging violations of state wiretapping statutes based on the use of so-called “session...more

EDRM - Electronic Discovery Reference Model

An In-Depth Look at the 2022 eDisclosure Systems Buyers Guide, Part 2

Purchasing Resources- When I said last time that the first 70+ pages is mostly dedicated to educational resources, that includes resources on the market, a procurement approach that can be used to select vendors and...more

Constangy, Brooks, Smith & Prophete, LLP

California Bar Requires Attorneys To Embrace Technology

Ditch those pens and Dictaphones! A colleague recently commented about how a former partner liked to joke, “I’ll break your hand if I catch you writing a brief by pen and paper!” Guess what his preferred technology...more

Rivkin Radler LLP

ABA Provides New Guidance On Remote Work For Lawyers

Rivkin Radler LLP on

On March 10, 2021, the American Bar Association released new guidance for attorneys working remotely. While there has never been a distinction in the Model Rules for Professional Conduct between working in a brick-and-mortar...more

Morgan Lewis

Russian Competition Authority Develops Guidelines for Preinstallation of Domestic Software

Morgan Lewis on

Following adoption of the law on the preinstallation of Russian software on electronic devices in December 2019, the Russian Federal Antimonopoly Service (FAS) has developed draft guidelines to determine the types of...more

ArentFox Schiff

Interactive Newsletter: Inside the Privacy Shield Annual Review

ArentFox Schiff on

Inside the Privacy Shield Annual Review - Dozens of senior US and EU government officials were joined by officials from data protection authorities in Austria, Bulgaria, France, Germany and Hungary to discuss whether the...more

ArentFox Schiff

Interactive Council Newsletter: Privacy Report: Airline Sues Software Provider Over Data Breach

ArentFox Schiff on

Delta Sues Software Provider Over Data Breach - Delta Airlines sued its customer service chat provider, [24]7.ai Inc., in New York federal court accusing it of lax digital security practices that allowed a hacker to steal...more

Association of Certified E-Discovery...

Sean O’Shea: Tips for Paralegals and Litigation Support Professionals – February 2019

Jury Can Decide Bad Faith Intent for Rule 37 Sanctions - In a slip and fall case, Carnival was found to have failed to take reasonable steps to preserve CCTV video. Judge Goodman noted the fact that its 30(b)(6)...more

King & Spalding

United States Department Of Justice Seeks To Dismantle Massive Kelihos Botnet, Files Complaint In Federal District Court

King & Spalding on

The United States Department of Justice (“DOJ”) recently announced that it would be undertaking an “extensive effort to disrupt and dismantle the Kelihos botnet – a global network of tens of thousands of infected computers...more

Fenwick & West LLP

Litigation Alert: The Sixth Circuit Expands Potential Federal Wiretap Act Liability for Developers and Sellers of Cloud-Based...

Fenwick & West LLP on

Last week, the Sixth Circuit expanded potential liability for violations of the Federal Wiretap Act for manufacturers of devices that can be used for wiretapping, like monitoring software, in reversing the dismissal of a...more

30 Results
 / 
View per page
Page: of 2

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
- hide
- hide