Beginning Next Week: InsideCounsel will become part of Corporate Counsel. Bringing these two industry-leading websites together will now give you comprehensive coverage of the full spectrum of issues affecting today's General Counsel at companies of all sizes. You will continue to receive expert analysis on key issues including corporate litigation, labor developments, tech initiatives and intellectual property, as well as Women, Influence & Power in Law (WIPL) professional development content. Plus we'll be serving all ALM legal publications from one interconnected platform, powered by, giving you easy access to additional relevant content from other InsideCounsel sister publications.

To prevent a disruption in service, you will be automatically redirected to the new site next week. Thank you for being a valued InsideCounsel reader!


InsideCounsel Magazine October 2015


  • Working out

    Law departments are tasked with cutting costs wherever and whenever possible. They leverage software and analytics, operations professionals and more to achieve savings. But the fact of the matter is, in-house lawyers are often stretched thin with the amount of work—both legal and otherwise—that comes across their desks. So, what...

  • Cyber suits

    Businesses need to be prepared—as best as possible—for the escalating number of cyber breaches and the threat of resulting litigation.

  • Securing your assets

    The highest profile hacks, the ones that get the most digital ink, are the ones that affect millions of people. When personally identifiable information (PII) is stolen from a major healthcare company or retail provider (think Target), millions of ordinary citizens find themselves in financial jeopardy, and the media and...

  • Regulatory priority

    In many ways, 2014 was the Year of the Data Breach. That year saw cyber-events at the Home Depot, JPMorgan Chase and Sony Entertainment, and the trend followed into 2015, with healthcare providers and government agencies showing that they, too, are vulnerable to attack. All of the incumbent attention that...

From The Editor

  • Time to sharpen your tech chops

    As an amateur student of human behavior (some would say “busybody”), I’ve always been fascinated by how new occupations come into being, and how existing jobs change. For example, a few years ago, during a few cross-country and intercontinental flights, I was always sitting next to someone who was studying...



  • More than great lawyers

    While legal insight can be the product of a solitary genius, the delivery of modern legal services demands a mix of people, processes and technology. Our previous columns calling for structured dialogue between law departments and law firms are informed by our view that the marketplace should pay more attention...


  • Labor & Employment Digest: October 2015

    Cybersecurity issues are a hot topic in legal and compliance circles, but, even as companies turn their attention to addressing these genuine concerns, other problems crop up like a game of whack-a-mole. The labor and employment legal landscape changes almost as fast as the privacy and data security space, so...


  • Discovery is a drag

    Whenever I am asked to choose one change that would most improve the patent litigation landscape in the United States, my answer is always the same: discovery reform. Discovery in U.S. patent litigation is far too extensive, expensive, time-consuming, risky and unwarranted. The United States is entirely alone in allowing...


  • Anti-corruption: Five ways to turn policies into practices

    You have developed a comprehensive set of anti-corruption policies and procedures, translated them into 25 languages and rolled them out to your employees and business partners. Now what? For most companies, anti-corruption compliance is well embedded among employees at headquarters. However, confidence in compliance drops when it comes to satellite...

Tour of Duty

  • Employee attitudes fuel your data security plan

    Your company's employees can support or undermine the foundation of your data security plan. They are the most likely to be targeted and the easiest to leverage into a valuable asset. We all are overwhelmed by security threats and proactively taking action can be daunting. At home, your employees might...

Advertisement. Closing in 15 seconds.