Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Assessing the Impact of Technology Trends on Legal Practice Image

Assessing the Impact of Technology Trends on Legal Practice

Ron Seigneur

This article highlights the 2011 Top 10 Technology Issues identified by the American Institute of Certified Public Accountants and discusses how law firms can benefit from an increased awareness of what the survey indicates.

How Not to Get What You Have Always Gotten Image

How Not to Get What You Have Always Gotten

J. Mark Santiago

It is clear that High Value Add outsourcing is the next big thing for law firms. It offers law firm management a path to better service at a reduced cost.

Features

Using Old Communications Technology May Cost More Than It's Saving Image

Using Old Communications Technology May Cost More Than It's Saving

James Whitemore

As the economy continues to flounder, CEOs and CFOs in law firms are often reluctant to replace technologies they believe are working fine. Yet, what they may not realize is while they are saving some upfront costs, ultimately they could be saving pennies to lose dollars, relatively speaking.

December issue in PDF format Image

December issue in PDF format

ALM Staff & Law Journal Newsletters

…

Features

Growing an International Presence Image

Growing an International Presence

Adrian Pang

The idea of growing internationally seems counterintuitive to what's going on in the current economy. Many organizations have scaled back or halted growth activities completely. While other companies are on the sideline, now is the right time to consider global growth and put yourself ahead of your competition.

Secured Creditors' Credit Bid Rights Under Cramdown Plan Image

Secured Creditors' Credit Bid Rights Under Cramdown Plan

Lawrence V. Gelber, James T. Bentley & Mike Paek

On June 28, 2011, in a decision of great significance to secured creditors, the U.S. Court of Appeals for the Seventh Circuit held that secured creditors have a statutory right to credit bid their debt at an asset sale conducted under a so-called "cramdown" plan. This decision is directly at odds with recent decisions in the Third and Fifth Circuits regarding a secured creditor's right to credit bid under a plan.

Viacom Urges Second Circuit to Revive YouTube Suit Image

Viacom Urges Second Circuit to Revive YouTube Suit

Mark Hamblett

Viacom International and a host of content providers asked a federal appeals court to reverse a decision dooming their claim that YouTube is liable for $1 billion in damages for copyright infringement.

Limit on Assigning Right to Pursue Online Copyright Infringement Image

Limit on Assigning Right to Pursue Online Copyright Infringement

Stan Soocher

In recent months, there has been a flurry of infringement litigation involving copyright troller Righthaven, which procured the right from publishers to file infringement suits over unauthorized online reproductions of the publishers' content. In several cases, the U.S. District Court for the District of Nevada, which is within the Ninth Circuit, has cited the Silvers decision to block Righthaven's claims. Now the U.S. District Court for the District of Colorado, which is within the Tenth Circuit, has raised a Silvers-type bar against Righthaven.

Features

A Lessor's Guide to Workouts Image

A Lessor's Guide to Workouts

Frank Peretore

Last month's installment of this article discussed preliminary issues to address in workouts and key provisions to include in workout agreements. This second installment discusses addressing potential future bankruptcy issues.

Features

ISP Access to e-Mail Content Is Not Invasion of Privacy Image

ISP Access to e-Mail Content Is Not Invasion of Privacy

Jonathan Bick

An Internet Service Provider (ISP) can legally search the e-mail that it processes. ISPs may lawfully search the content of users' e-mails for many purposes, including assisting law enforcement, ensuring compliance with the ISP's terms-of-use agreement and protecting the ISP from legal difficulties, to name a few. Such activities do not currently constitute an invasion of the e-mail user's privacy.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›