<i><b>Case Study:</b></i> Managing e-Discovery In-House with Discovery Attender
As the person at Babst Calland responsible for the technical aspects of electronic discovery, I recognized early on that our mid-sized law firm was facing an ever-increasing amount of electronically stored information (ESI). This required us to review and improve our e-discovery tools and processes to address the challenges associated with collecting, searching and processing the growing volume of client data.
10 Questions About WestlawNext
As corporate clients continue to push back on legal costs and define client value, law firms are looking at technology to drive internal efficiencies and productivity to achieve these twin aims. Jaye Lapachet is the Manager of Library Services for the San Francisco-based law firm of Coblentz, Patch, Duffy & Bass LLP. In this Q&A, she discusses her application of WestSearch capabilities within WestlawNext and Folder Sharing, which she has found drive significant efficiencies and productivity.
Features
The ESI Race Heats Up
It's probably not a stretch to say that e-mail has been the single biggest factor in the creation of the electronic discovery industry as we know it today. e-Mail has been seen as almost synonymous with e-discovery, in many ways to the detriment of other valuable forms of ESI. But, that race has tightened up.
Features
Understanding Cross-references In Word 2010
Cross-reference is a powerful tool in guiding your reader to specific locations in a document. When using the Cross-reference feature, always keep the reader in mind and create those references to make navigating throughout the document as straightforward as possible.
In the Marketplace
Highlights of the latest equipment leasing news from around the country.
Features
Lending to an LLC? Think Twice and Draft Carefully
As it stands right now, under Delaware law, present creditors of insolvent LLCs have one less avenue to be made whole.
Features
PII: How New Technology Makes It Easier To Maintain Compliance
A study done at MIT found that 87% of the population in the U.S. could be uniquely identified by just three pieces of Personally identifiable information (PII): their five-digit zip code, gender and date of birth. This demonstrates that SSNs, while valuable, is not necessary to identify unique individuals.
A Lessor's Guide to Workouts
Every workout should be structured to anticipate a future default and enhance procedural, substantive, and collateral positions. This first installment of a two-part article discusses preliminary issues to address in workouts and key provisions to include in the workout agreement.
Features
Constitutionality Of Facebook Threat Charges Challenged
A Pennsylvania man who was indicted for making violent threats on Facebook is now challenging the constitutionality of the federal cyberstalking statute, arguing that the law criminalizes "pure speech" and is vague and overbroad.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Legal Possession: What Does It Mean?Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Cutting Off the Stream: How United States v. Silver Affects "Stream of Benefits" or "Retainer" BriberyAlthough the court stressed that, by vacating certain of former NY State Assembly Speaker Sheldon Silver's counts of conviction, it was clarifying and not altering the "as opportunities arise" theory, it nevertheless emphasized that this theory requires particularity with respect to the "question or matter" that is the subject of the bribe payor and recipient's corrupt agreement.Read More ›