We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.

Search results

Order by: most recent most popular relevance



Results: 1-10 of 1,308

Ten questions every General Counsel should be asking their CIO
  • Nelson Mullins Riley & Scarborough LLP
  • USA
  • July 23 2015

This summer's steady and unrelenting stream of highly publicized data breaches is forcing long overdue discussions around data security and incident


To cull a Mockingbird: the popular, but risky, “keyword” collection filter
  • Jackson Lewis PC
  • USA
  • July 23 2015

This is part four of the continuing series on two-filter document culling. Please read part one and part two and part three first. Hopefully you will


Lawyers take note: here comes the Internet of Things
  • Thompson Hine LLP
  • USA
  • July 23 2015

This might be an odd confession for a blogger, but I've always been a little leery of technology. I'm not a Luddite, or anything, but I'm definitely


The culling fields: some software is better than others at efficient document culling
  • Jackson Lewis PC
  • USA
  • July 16 2015

This is part three of the continuing series on two-filer document culling. Please read part one and part two first. A word of caution before I get


License to cull: why efficient and effective document review is important to our system of justice
  • Jackson Lewis PC
  • USA
  • July 8 2015

This is part two of the continuing series on two-filer document culling. Please read part one first. Every attorney has a license to cull irrelevant


Two-filter document culling: the first in a series of blogs explaining an advanced document review technique
  • Jackson Lewis PC
  • USA
  • July 2 2015

This is the first in a series of blogs describing a two-filter method for the identification and mass culling of irrelevant documents. The method is


Get ready for new technology rules in the revised mass. Rules of professional conduct
  • Sherin and Lodgen LLP
  • USA
  • June 24 2015

It would be a nightmare for any lawyer to find that someone had hacked into their firm's computer network and stolen confidential client information


Leclairryan's accountant and attorney liability newsbrief- Summer 2014
  • LeClairRyan
  • USA
  • June 16 2015

The Massachusetts Supreme Judicial Court has held the Commonwealth may not compel a law firm to produce its client’s cell phone pursuant to a grand


Lawyers need to know these 10 myths about cyberthreats
  • Gardere Wynne Sewell LLP
  • USA
  • June 9 2015

Since lawyers are guardians of client data it is essential that they be vigilant about cyberthreats and "be more proactive in finding and preparing


LFaaS (Law Firm as a Service) III AI and the shape of law to come
  • Kemp IT Law
  • United Kingdom
  • June 1 2015

So where are we where is your firm on the spectrum between ‘business as usual’ and ‘the end of lawyers’? As the market enjoys its best spell for