Features
Outsourcing in the New Legal Model
There's a new legal model in town ' ushered in by a new era of law firm client ' requiring firms to streamline operations and capture cost efficiencies at every level while also maintaining the high quality of services on which their reputations are staked.
Germer Gertz Improves Productivity with Secure Document Delivery
When you send a document to someone electronically, what's your preferred tool? Do you turn to File Transfer Protocol (FTP)? Or perhaps a thumb drive? For many lawyers and legal professionals (and this won't come as a surprise), the go-to tool is e-mail. It is easy and lawyers get it. But from an IT perspective, e-mail poses many problems.
Features
The Future of the Profession Lies in Its Past
If the firm of the future is to compete successfully, the role of the professional is to be aware of the need for thoughtful and professional competition, and to be educated in the skills of competitive marketing.
Finding a Document Management System That Fits
Growing a firm without updating the way documents are handled is costly and creates chaos. By consolidating all of these documents into a centralized Document Management Software (DMS) system, you have the ability to put documents at the fingertips of the right people at the right time.
Law Firms and Cyber Security
Many law firms today steam along with a false sense of security that the cybercrime lurking in today's electronic channels of commerce does not pose a potentially critical threat. They are wrong.
Consumer Devices, e-Discovery and Security
Smartphones, tablets and other portable electronics have swept the nation in the past few years and are now being integrated into people's personal and business lives on a scale heretofore unseen. However, most of these devices were created for the consumer market and not necessarily for business applications. Therefore, confidential, sensitive and proprietary data must be protected both on the device itself and on the corporate network where the data resides.
Debunking the Seven Biggest Myths of Predictive Coding
Despite its promise, there are a number of myths associated with the design and use of technology assisted review, and in particular predictive coding, that have obscured the debate around the adoption of this technology. It is time to put an end to some of these myths.
A Guide to Breast-Feeding Policies
In-house counsel should examine their companies' breast-feeding policies, including how they handle employees who need time to attend to breast-feeding responsibilities while at work.
Claims of Protected Concerted Activity
In a recent case, even though there was no evidence that the employee had discussed a particular wage issue with other employees, the NLRB nevertheless found violation.
Features
Electronic Handheld Devices
There are substantial legal risks associated with requiring employees to carry electronic handheld devices. Here's what employers need to do.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- Why So Many Great Lawyers Stink at Business Development and What Law Firms Are Doing About ItWhy is it that those who are best skilled at advocating for others are ill-equipped at advocating for their own skills and what to do about it?Read More ›
- The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business AlliesPractical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.Read More ›
- Best Practices for Virtual Internal InvestigationsIn order to ensure that remote internal investigations are probative and effective, companies and their outside counsel should employ a few simple and practical practices.Read More ›
- Hiring Practices and the FCPAWhile laws such as the FCPA do not necessarily prohibit hiring individuals with criminal records or bad credit records or who are former government officials, they do require employers to identify these individuals and assess whether their hire would pose a threat, violate the laws outright or impose an administratively difficult burden due to the need to monitor their activities.Read More ›