The Evolving Landscape of Modern Tort Liability
While the call for tort reform is a continuing cry by opponents of our civil justice system, the necessity for, and the scope of, reform remains largely debatable.
Features
Practice Tip: Spoliation and the 'Bad Faith' Requirement
This article underscores the necessity of understanding the importance of preserving evidence given the jurisdictional differences in spoliation law.
Features
Navigating the Stream of Commerce in the Wake of Nicastro
What is required to establish the minimum contacts necessary to exert specific personal jurisdiction over a foreign defendant in a forum state?
Features
Outsourcing in the New Legal Model
There's a new legal model in town ' ushered in by a new era of law firm client ' requiring firms to streamline operations and capture cost efficiencies at every level while also maintaining the high quality of services on which their reputations are staked.
Germer Gertz Improves Productivity with Secure Document Delivery
When you send a document to someone electronically, what's your preferred tool? Do you turn to File Transfer Protocol (FTP)? Or perhaps a thumb drive? For many lawyers and legal professionals (and this won't come as a surprise), the go-to tool is e-mail. It is easy and lawyers get it. But from an IT perspective, e-mail poses many problems.
Features
The Future of the Profession Lies in Its Past
If the firm of the future is to compete successfully, the role of the professional is to be aware of the need for thoughtful and professional competition, and to be educated in the skills of competitive marketing.
Finding a Document Management System That Fits
Growing a firm without updating the way documents are handled is costly and creates chaos. By consolidating all of these documents into a centralized Document Management Software (DMS) system, you have the ability to put documents at the fingertips of the right people at the right time.
Law Firms and Cyber Security
Many law firms today steam along with a false sense of security that the cybercrime lurking in today's electronic channels of commerce does not pose a potentially critical threat. They are wrong.
Consumer Devices, e-Discovery and Security
Smartphones, tablets and other portable electronics have swept the nation in the past few years and are now being integrated into people's personal and business lives on a scale heretofore unseen. However, most of these devices were created for the consumer market and not necessarily for business applications. Therefore, confidential, sensitive and proprietary data must be protected both on the device itself and on the corporate network where the data resides.
Debunking the Seven Biggest Myths of Predictive Coding
Despite its promise, there are a number of myths associated with the design and use of technology assisted review, and in particular predictive coding, that have obscured the debate around the adoption of this technology. It is time to put an end to some of these myths.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- Mixed Ruling in Jefferson Starship Band Name SuitWhat's in a rock band's name? Plenty, if you are talking about Jefferson Starship, which goes back more than 40 years, has had more than 30 members and was born from the 1960s psychedelic rock band Jefferson Airplane.Read More ›
