Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Backup Protection and Continuity Keep Firms Running Image

Backup Protection and Continuity Keep Firms Running

Darryl d'Aquin

Firms of every size and in every geographic area must protect their electronic data and be prepared for potential IT disasters.

Sorting Out Vested Rights and Non-Conforming Uses Image

Sorting Out Vested Rights and Non-Conforming Uses

Stewart E. Sterk

Pre-existing non-conforming use doctrine and "vested rights" doctrine are two different, but related, mechanisms. The Court of Appeals recently decided a case in which the landowner raised both doctrines.

Virtualization Technology in the Law Firm Image

Virtualization Technology in the Law Firm

Stanleigh Rabin

Virtualization is one of <i>the</i> IT buzzwords in 2010. One of the greatest advantages that virtualization brings is the ability to minimize the complexity of the end-user computing environment for the firm's attorneys and support staff.

Index Image

Index

ALM Staff & Law Journal Newsletters

A comprehensive list of all cases covered in this issue.

Features

Third Circuit Asked to Clarify Student Internet Speech Cases Image

Third Circuit Asked to Clarify Student Internet Speech Cases

Shannon P. Duffy

Cutting-edge questions in the First Amendment arena have recently stemmed from clashes between students and school districts over the limits ' if any ' that may be imposed on speech posted on social networking sites like MySpace and Facebook. Now lawyers on both sides of the issue are urging the Third U.S. Circuit Court of Appeals to vacate two recent ' and seemingly conflicting ' decisions by two different three-judge panels, and to hold rearguments before the full court.

Features

Active Inducement In the Post-Grokster World Image

Active Inducement In the Post-Grokster World

Richard Raysman & Peter Brown

This article discusses the theory of active inducement in copyright law, the evolution of P2P technology over the past decade, recent U.S. and foreign legal decisions, and developments impacting copyright holders, file-sharing networks and Internet service providers.

Law Firms Slow To Awaken to Cybersecurity Threats Image

Law Firms Slow To Awaken to Cybersecurity Threats

Karen Sloan

Law firms have been targeted by a sophisticated network of overseas hackers looking to infiltrate computer systems in order to gather data or monitor attorney activity, according to attorneys and technology experts. Law firms have dealt quietly with cyberattacks for years, but lately those strikes appear to be on the rise.

Movers & Shakers Image

Movers & Shakers

ALM Staff & Law Journal Newsletters

Who's doing what; who's going where.

Social Networking Sites Present Challenges for Copyright Protection Image

Social Networking Sites Present Challenges for Copyright Protection

Ryan W. O'Donnell And Aneesh Mehta

Many social networking site users are likely to be unaware of the potential copyright issues associated with posting such original works. Once the work is on the Internet, it must be assumed that it will be available to all parties, both intended and unintended. What legal remedies are available if somebody copies a photograph or video and uses it for his or her own purposes without the owner's consent?

Features

Verdicts Image

Verdicts

ALM Staff & Law Journal Newsletters

Recent rulings of importance to you and your practice.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES