Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
“Human decision-making is complex. On our own, our tendency to yield short-term temptations, and even to addictions, may be too strong for our rational, long-term planning. ” ' Peter Singer
The legal industry should pay attention to Singer's words of caution. Across the nation, there exists a relatively untested notion that the only approach to e-discovery is case-by-case ' that every unique case requires an equally unique approach to discovery. While this phenomenon is a natural component of any industry seeking standardization, the unfortunate byproduct can be seen when organizations incur great costs to marry pre-existing on-premise solutions with whatever contracted-for solution is required to react to the case that came down the pipe today.
There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
A trend analysis of the benefits and challenges of bringing back administrative, word processing and billing services to law offices.
Summary Judgment Denied Defendant in Declaratory Action by Producer of To Kill a Mockingbird Broadway Play Seeking Amateur Theatrical Rights
“Baseball arbitration” refers to the process used in Major League Baseball in which if an eligible player's representative and the club ownership cannot reach a compensation agreement through negotiation, each party enters a final submission and during a formal hearing each side — player and management — presents its case and then the designated panel of arbitrators chooses one of the salary bids with no other result being allowed. This method has become increasingly popular even beyond the sport of baseball.
Executives have access to some of the company's most sensitive information, and they're increasingly being targeted by hackers looking to steal company secrets or to perpetrate cybercrimes.