Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
Every day, someone is predicting a sea change in the way we conduct discovery. However, due to the dogged nature of many litigators, the old “belt and suspenders” style of discovery persists. Many attorneys adhere to the philosophy of reviewing each and every document in the order that they find them. I am not here to predict the downfall of those who are sticking to that philosophy; in fact, I am quite sure that the old methods of approaching discovery will last eternally.
However, there may be a better way. By using technology to plan document review in advance, you can reduce review costs and make your firm more competitive in today's budget-conscious environment. The question is: Which tools are best for you? e-Discovery solutions, like other business applications, continue to evolve, providing greater functionality and ease of use. You don't have to be an IT expert to make wise choices ' if you keep these considerations in mind.
Review Planning
The plan set into motion at this critical phase will often affect the overall success or failure of the review effort. The characteristics of the data tend to best shape the overall review strategy; however, this can be a hard factor to judge without sufficient information. Starting at e-mail number 1 and finishing 99,000 e-mails later will not give you a sufficient basis to form a strategy. The following options may provide a clearer picture.
This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?