Consortium Wins for Bridge Collapse Victims
We all know that technological advances are enabling us to do things that wouldn't have been possible only a few years ago. The litigation resulting from the I-35W Bridge Collapse in Minneapolis is an example of how technology contributed to a speedy and successful conclusion for our clients. In litigation support, technology plays an especially crucial role when there are many data and document sources as well as many parties working together to review the data.
Bradford & Barthel's Evolution with Google Apps
Rapid growth at Bradford & Barthel in 2009 exposed a major firm challenge: finding an effective way to associate technology and knowledge management with firm strategy and business objectives.
Features
Judge Not, Lest Ye Be Judged -- Via Online Resources
The explosion of information about judges now available online has enabled researchers to uncover indications of possible bias, prejudice and other relevant tidbits.
The Hidden Liability in Legacy Data
Organizations that face frequent litigation or regulatory oversight are quickly implementing information governance strategies. However, these strategies commonly focus on the current or online data assets, and often neglect the hidden data.
SWOT-ting Yourself ' and Your Competition
One tool used by for-profit and non-profit firms alike to plan to achieve specific goals is SWOT analysis. At its most basic level, a firm identifies its strengths, weaknesses, opportunities and threats when decision-makers ' and others, if the process is planned that way ' thinking about how to achieve one goal, or more.
Features
Is Anyone Not a Foreign Official Under the FCPA?
The DOJ has brought cases against companies and individuals in relation to their dealings with state-owned enterprises based on a broad reading of the term "instrumentality," a term not otherwise defined in the statute prohibiting corrupt payments to "foreign officials.
Foreign Bribery: Feds Aggressively Use FCPA and the Money Laundering Statute
This article examines recent charges and settlements suggesting a new approach by federal authorities to foreign bribery.
Arnstein & Lehr Automates
Transferring files has always been a challenge for law firms. Law firms employ various methods ' from snail mail to e-mail ' but all these methods lack efficiency. When Arnstein & Lehr LLP, founded in 1893, was faced with the persistent challenge all law firms face when it comes to transferring files, we began to research different solutions to help streamline the process.
Evaluation of Intelligent Discovery Processes by Squire, Sanders & Dempsey
Due to the high volume of electronically stored information, document review and production is often the most expensive part of the discovery process. In an effort to lower the costs of litigation discovery, Squire Sanders invested in an assessment of next-generation intelligent discovery tools and processes.
Features
Converting to Office 2007 and Struggling with Word?
In collecting and analyzing massive amounts of legal helpdesk ticketing data, including more than 600,000 helpdesk tickets within a recent nine-month time frame, legal-specific outsourcers and internal helpdesks alike pinpointed a noticeable, albeit predictable trend: More than 50% of all tickets resolved by the helpdesk relate to Microsoft Office products, with Word and Outlook leading the charge.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- New AI Suit By Authors Against AnthropicA new class action filed on behalf of several authors alleges that artificial intelligence startup Anthropic committed "brazen infringement" by using "hundreds of thousands" of copyrighted books to train "Claude," its flagship collection of large language models.Read More ›
- A 'Cloud Security Doctrine' for Law FirmsCloud computing may be here to stay, but is it truly safer than the solutions that it's outmoding? The Legal Cloud Computing Association (LCCA) thinks there's a path to greater security, publishing for law firms its first "Cloud Security Doctrine."Read More ›