Account

Sign in to access your account and subscription

Register

LJN Newsletters

  • Analysis of key rulings.

    March 29, 2010ALM Staff | Law Journal Newsletters |
  • During the fall of 2009, the Legal Technology Institute at the University of Florida Levin College of Law conducted an extensive nationwide survey of the legal profession regarding its use of case, matter and practice management system software.

    March 29, 2010Andrew Z. Adkins III
  • Recent cases of interest.

    March 29, 2010ALM Staff | Law Journal Newsletters |
  • Pre-existing non-conforming use doctrine and "vested rights" doctrine are two different, but related, mechanisms. The Court of Appeals recently decided a case in which the landowner raised both doctrines.

    March 29, 2010Stewart E. Sterk
  • Virtualization is one of the IT buzzwords in 2010. One of the greatest advantages that virtualization brings is the ability to minimize the complexity of the end-user computing environment for the firm's attorneys and support staff.

    March 29, 2010Stanleigh Rabin
  • A comprehensive list of all cases covered in this issue.

    March 29, 2010ALM Staff | Law Journal Newsletters |
  • Cutting-edge questions in the First Amendment arena have recently stemmed from clashes between students and school districts over the limits ' if any ' that may be imposed on speech posted on social networking sites like MySpace and Facebook. Now lawyers on both sides of the issue are urging the Third U.S. Circuit Court of Appeals to vacate two recent ' and seemingly conflicting ' decisions by two different three-judge panels, and to hold rearguments before the full court.

    March 29, 2010Shannon P. Duffy
  • This article discusses the theory of active inducement in copyright law, the evolution of P2P technology over the past decade, recent U.S. and foreign legal decisions, and developments impacting copyright holders, file-sharing networks and Internet service providers.

    March 29, 2010Richard Raysman and Peter Brown
  • Law firms have been targeted by a sophisticated network of overseas hackers looking to infiltrate computer systems in order to gather data or monitor attorney activity, according to attorneys and technology experts. Law firms have dealt quietly with cyberattacks for years, but lately those strikes appear to be on the rise.

    March 29, 2010Karen Sloan