article thumbnail

Fastcase Names Its 11th Annual Class of Fastcase 50 Innovation Honorees

LawSites

This year’s group of honorees is composed of a diverse array of lawyers, legal technologists, law librarians, judges, legal researchers, innovators, and people who are committed to reforming and automating the law. (Disclosure: I was listed in the inaugural group in 2011.). Tapia , Shareholder, Tiffany & Bosco.

article thumbnail

Law Firm Cyber Risk: The 5 Ways Cybercriminals Most Likely Will Attack Your Computers — And 7 Things You Can Do

Attorney at Work

You can have the misfortune of encountering either of these types in the routine course of conducting legal research or just while innocently searching for goods and services. Your risk of confidential data being stolen or lost increases for a time whenever you fire an employee who had access to those data. Inside jobs.

Law Firms 276
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

15 Top Tools for Lawyers To Help Grow Their Law Firms

MyCase

eDiscovery Tools Legal research and eDiscovery tools give you a simpler and more efficient way to manage discovery and analysis. Compliance matters in hiring, too, and using hiring software can centralize your data management and ensure that you’re tracking the necessary data to maintain compliance with employment laws.

article thumbnail

Writs of Mandamus, Data Accessibility, and the Federal Circuit

Patently O

It’ll also ensure that legal research databases contain these orders going forward. I really want to commend Chief Judge Moore and the whole Federal Circuit, its clerks office, and the data management folks for making these key orders available. Thanks to Dmitry Karshtedt for alerting me to this change!

article thumbnail

Law x Generative AI: The Future That's Already Here

Everchron

From drafting documents to legal research, AI can enhance efficiency and provide insights previously unattainable through traditional methods. This includes verifying that AI systems offer adequate security protections, do not share information with unauthorized parties, and comply with data retention protocols.

Laws 52