Features
Prognostication Is a Mug's Game
What are reasonable assumptions about the future of the legal profession in this dynamic society? Here, we can surmise ' if not predict ' a future by extrapolating two things from the past.
Lessons from Twitter's Settlement with the FTC
The announcement that social-networking phenomenon Twitter has agreed to settle FTC charges that it had engaged in inadequate privacy and information security practices illustrates some simple mistakes that social media and other online companies can make. If the consent decree is approved, Twitter will have to live with the oversight that accompanies an FTC consent decree for 20 years (or more than four times the length of time that the company has existed).
Features
The Brave New World Of e-Workplace Privacy Policies
Part One of this article, last month, examined the liability involved with social media and e-mail use. Part Two discusses implementing compliant and defensible workplace policies.
Features
Crowdsourcing the Law
The Internet's completely over, the musician once-again known as Prince declared this summer. If so, I am at a loss to explain the ongoing emergence of innovative Web sites such as Spindle Law, a new site that is reconfiguring the traditional legal treatise to make it better fit a "Web 2.0" world.
Features
Navigating the Changing Technological Landscape
In <i>City of Ontario v. Quon</i>, the U.S. Supreme Court held that a government employer's search of an employee's communications on an employer-issued pager was reasonable under the circumstances and, therefore, did not violate the Fourth Amendment of the Constitution. The Court's narrowly tailored decision underscores that cases in the area of employee privacy will continue to be highly fact-sensitive.
Features
Client Speak: Client Feedback ' The 12 Essential Steps
This article ' in two parts ' will deal with the Client Feedback process, specifically the 12 essential steps involved. This first part lists the 12 steps and then describes steps 1 through 4a (pre-interview planning).
Career Journal: Possession Is Not Nine-Tenths of the Law
Even if law firms have made no changes to their existing structure, partners have done little lately to bolster the cause of their marketing organizations.
ERM 2.0 ' What's Next for Legal Marketers
Enterprise Relationship Management (ERM) is what firms today use to track and manage their relationships to determine which connections firm-wide can be valuable in growing their business. But ERM, like most marketing technologies, has evolved.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- Inferring Dishonesty: The Fifth Amendment and Fidelity CoverageDishonest employees always have posed a problem for businesses. The average business may lose 6% of its annual revenues to employee fraud, and cumulatively the impact of employee theft on the economy is estimated to be $600 billion annually. <i>See</i> Association of Certified Fraud Examiners ("ACFE"), 2002 Report to the Nation on Occupational Fraud & Abuse, at ii, 4 (2002), available at <i>www.cfenet.com/publications/rttn.asp.</i> Although the average loss through employee embezzlement is $25,000, where computerized financial records or transactions are involved, the average loss increases nearly twentyfold. <i>See</i> National White Collar Crime Center, <i>WCC Issue: Embezzlement/Employee Theft,</i> at 2 (2002), available at <i>http://nw3c.org/downloads/Computer_Crime_Weapon.pdf.</i>Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›