While the call for tort reform is a continuing cry by opponents of our civil justice system, the necessity for, and the scope of, reform remains largely debatable.
- May 29, 2012Larry E. Coben
This article underscores the necessity of understanding the importance of preserving evidence given the jurisdictional differences in spoliation law.
May 29, 2012Josh Becker and Jenny MendelsohnWhat is required to establish the minimum contacts necessary to exert specific personal jurisdiction over a foreign defendant in a forum state?
May 29, 2012Daniel J. Herling and Amy BlackwoodThere's a new legal model in town ' ushered in by a new era of law firm client ' requiring firms to streamline operations and capture cost efficiencies at every level while also maintaining the high quality of services on which their reputations are staked.
May 29, 2012Robert C. MatternWhen you send a document to someone electronically, what's your preferred tool? Do you turn to File Transfer Protocol (FTP)? Or perhaps a thumb drive? For many lawyers and legal professionals (and this won't come as a surprise), the go-to tool is e-mail. It is easy and lawyers get it. But from an IT perspective, e-mail poses many problems.
May 29, 2012Susan WhitmireIf the firm of the future is to compete successfully, the role of the professional is to be aware of the need for thoughtful and professional competition, and to be educated in the skills of competitive marketing.
May 29, 2012Bruce W. MarcusGrowing a firm without updating the way documents are handled is costly and creates chaos. By consolidating all of these documents into a centralized Document Management Software (DMS) system, you have the ability to put documents at the fingertips of the right people at the right time.
May 29, 2012Danny MeierMany law firms today steam along with a false sense of security that the cybercrime lurking in today's electronic channels of commerce does not pose a potentially critical threat. They are wrong.
May 29, 2012Karl G. Nelson and Michael D. Y. SukenikSmartphones, tablets and other portable electronics have swept the nation in the past few years and are now being integrated into people's personal and business lives on a scale heretofore unseen. However, most of these devices were created for the consumer market and not necessarily for business applications. Therefore, confidential, sensitive and proprietary data must be protected both on the device itself and on the corporate network where the data resides.
May 29, 2012Gavin W. Manes and Tom O'ConnorDespite its promise, there are a number of myths associated with the design and use of technology assisted review, and in particular predictive coding, that have obscured the debate around the adoption of this technology. It is time to put an end to some of these myths.
May 29, 2012David J. Kessler

