Features

Best Practices In Second Request Document Review: Eliminating the Fear Factor
Part One of a Two-Part Article: Challenges and solutions in document review HSR second requests have become increasingly common in mergers or acquisitions that meet the premerger reporting threshold, which in 2022 was a transaction value of more than $101 million. The burdens of complying with second requests are onerous. The mere thought of undergoing such an exercise tends to strike fear in the heart of the legal department. In this article series, we'll outline the major challenges of second requests, suggest strategies to overcome them, and discuss how to face a second request with equanimity and confidence.
Features

Innovating Hybrid: Empathy and Iteration
Recognizing that this is a time of innovation, one way law firms can 'prepare for a future we can't yet see' is through leveraging two key levers: the need for empathy and iteration.
Features

What's In Store for the Blockchain Industry In 2023?
The FTX bankruptcy caps a very difficult 2022 for the entire blockchain industry, spanning exchanges to decentralized finance to non-fungible tokens (NFTs). Blockchain and crypto skeptics are shouting "I told you so," while investors watch billions of investment dollars evaporate under the harsh light of the bankruptcies of Celsius, Compute North and now FTX.
Features

Is Asking E-Discovery Vendors for Indemnification for Data Breaches Provide Security of Clients' Data?
Threats of cyberattacks have not only made legal professionals more wary — especially as legal teams in firms and in-house are increasingly the target of cyber hackers — but it has also changed their relationship with vendors.
Features

Privilege Logs: Strategy, Best Practices and Practical Advice
This article provides an overview of the different types of privilege logs, lays out best practices for negotiating ESI or privilege-log protocols, and discusses other issues that can occur with privilege logs in e-discovery.
Features

Data Minimization Meets Defensible Disposition: Just Say No to ROT and Over-Retention of Personal Information
Like a good diet and regular exercise for the body, data minimization and routine, defensible purging of outmoded documents are essential to maintaining healthy organizational information hygiene.
Features

Leaning on Trusted Partners to Drive Legal Tech Adoption and Avoid Failed Implementation
Turning to familiar, trusted partners to help navigate the unruly waters of change management, adoption and an ocean of new legal technology options.
Features

FTX Bankruptcy Sends Tremors Through Crypto Regulation
The sudden and spectacular crash of crypto-exchange FTX will send long-lasting tremors through both the nation's financial regulatory and bankruptcy landscapes.
Features

Attorneys Can Have Their (Hybrid) Cake and Eat It, Too
Lawyers, especially young lawyers, want to work from home. But there are downsides, such as a decrease in networking and personal relationships. How can technology help balance these out so that attorneys and law firms can have their cake and eat it too.
Features

Online Harassment In the Workplace
As businesses expand their use of augmented reality games for the purpose of meeting and recruitment, internet harassment has become more prominent, particularly workplace sexual harassment.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- Risks of “Baseball Arbitration” in Resolving Real Estate Disputes“Baseball arbitration” refers to the process used in Major League Baseball in which if an eligible player's representative and the club ownership cannot reach a compensation agreement through negotiation, each party enters a final submission and during a formal hearing each side — player and management — presents its case and then the designated panel of arbitrators chooses one of the salary bids with no other result being allowed. This method has become increasingly popular even beyond the sport of baseball.Read More ›
- Private Equity Valuation: A Significant DecisionInsiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity LitigationWhile the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.Read More ›