from-tgc

Understanding the Key Stages of the Legal Hold Lifecycle

Learn about the key stages of the legal hold lifecycle to ensure your organization is protected from non-compliance, data loss, and legal penalties.

Why Legal Departments Should Benchmark Against Industry Standards and Historical Data

Understand why legal departments, increasingly pressured to justify budgets and demonstrate the impact they might have on their companies, should benchmark against industry standards and historical data.

Court Allows Non-Medical Evidence in Medical Leave Claim Case

Read about the Ninth Circuit Court of Appeals’ decision, which allowed an employer to use non-medical evidence to challenge a medical leave claim under the Family Medical Leave Act (FMLA).

Effective Legal Vendor Management for Legal Ops

Read more about the steps needed for effective legal vendor management, how to develop strong vendor relationships, and what to do if vendors fail to meet expectations.

How Legal Operations and Technology Are Reshaping Law Departments

Find out how legal operations and technology are reshaping law departments by reading this interview with Stephanie Lopes, Chief Legal Officer of Volt.

How to Draft Effective Alternative Dispute Resolution Clauses

Get actionable insights about drafting alternative dispute resolution clauses from Kelly Turner of the American Arbitration Association.

Cybersecurity Issues Are Changing Board Governance Duties

 Learn why many directors don’t understand their board governance duties regarding cyber risk and focus too much on technical protections. 

How Master Data Management Can Keep Big Companies from Drowning in Useless Data

Read why master data management can make or break reliability in organizations with multiple business units in which data silos lead to errors.

Halliburton Data Breach Was Significant, Prompted Notifications

Understand why the Halliburton data breach was significant, prompting communications with customers and law enforcement and causing a partial shutdown of systems.

Hackers Are Stealing Encrypted Data For Quantum Computing To Decrypt Later

Learn why hackers are stealing encrypted data that will only become valuable when quantum computing that breaks cryptography becomes available.

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top