Growing a firm without updating the way documents are handled is costly and creates chaos. By consolidating all of these documents into a centralized Document Management Software (DMS) system, you have the ability to put documents at the fingertips of the right people at the right time.
- May 29, 2012Danny Meier
Many law firms today steam along with a false sense of security that the cybercrime lurking in today's electronic channels of commerce does not pose a potentially critical threat. They are wrong.
May 29, 2012Karl G. Nelson and Michael D. Y. SukenikSmartphones, tablets and other portable electronics have swept the nation in the past few years and are now being integrated into people's personal and business lives on a scale heretofore unseen. However, most of these devices were created for the consumer market and not necessarily for business applications. Therefore, confidential, sensitive and proprietary data must be protected both on the device itself and on the corporate network where the data resides.
May 29, 2012Gavin W. Manes and Tom O'ConnorDespite its promise, there are a number of myths associated with the design and use of technology assisted review, and in particular predictive coding, that have obscured the debate around the adoption of this technology. It is time to put an end to some of these myths.
May 29, 2012David J. KesslerIn-house counsel should examine their companies' breast-feeding policies, including how they handle employees who need time to attend to breast-feeding responsibilities while at work.
May 29, 2012Art LambertIn a recent case, even though there was no evidence that the employee had discussed a particular wage issue with other employees, the NLRB nevertheless found violation.
May 29, 2012Kevin C. McCormickThere are substantial legal risks associated with requiring employees to carry electronic handheld devices. Here's what employers need to do.
May 29, 2012Karla GrossenbacherMisclassifying employees as "independent contractors" may put employers in triple jeopardy. (See article infra by Rosanna Sattler.)
May 29, 2012Robert G. Brody and Rebecca GoldbergThe classification of independent contractors is garnering increased attention at both state and federal agencies and courts. This article outlines some general guidelines based on recent state and federal court decisions.
May 29, 2012Rosanna Sattler, Nancy Puleo and James E. KruzerSocial media sites may also contain relevant information not available through traditional screening tools, like criminal background checks or reference checks. But should employers ask for passwords?
May 28, 2012Anna Hickman

