Searching for child pornography on the Internet and following links to make such images appear on a computer screen constitutes knowing possession or control of that material, the Pennsylvania Supreme Court has ruled.
- June 29, 2009Peter Hall
Delivering a blow to bloggers' rights, a federal appeals court has ruled that a Washington state teacher's blog attacking co-workers, the union and the school district was not protected speech, and therefore she was not unlawfully demoted over it.
June 29, 2009Tresa BaldasThis article analyzes how courts are handling jurisdictional questions attendant to the next generation of technology, such as forms of "cloud computing," including virtual data rooms and social networks. As these technologies continue to develop and opportunities arise to increase revenue, companies risk having to defend themselves in far-off jurisdictions never before contemplated.
June 29, 2009Robert S. Friedman and Mark E. McGrathWhat attorneys are missing is a brand new class of case management programs which, while they seek to replace older programs, also seek to solve many of the concerns law firms face when dealing with digital client data: security, mobile access and backup. As one of the newcomers to this market, Rocket Matter has embraced the new Software as a Service ("SaaS") model of delivering software from the Internet Cloud.
June 29, 2009Finis R. Price, IIIDespite the fact that our total data creation had increased exponentially, Reed Smith hadn't invested nearly enough in our information infrastructure, and simple processes such as document retrieval were taking far too long. We knew we needed to take control of our data before it took hold of us. Following is an account of the firm's recent implementation of Recommind's MindServer Search platform as the foundation for its Knowledge Management infrastructure.
June 29, 2009Tom BaldwinThe document metadata contained in a Word document other than the intended text doesn't necessarily create risk of adverse disclosure, because some document metadata is necessary for formatting or macro automation of the document. However, some document metadata, such as Tracked Changes, may be used to share among cooperators, but should not be shared with adversaries or in some instances clients, because it contains author and date metadata.
June 29, 2009Randal FarrarOne way legal practices are trying to handle cutbacks is through increased use of technology ' essentially harnessing software and online technology to make employees and operations more efficient while maintaining quality work. Working with IT colleagues, this has proven to be a successful strategy for many lawyers. However, it turns out there are some rather sharp differences in how technology is perceived and used by legal professionals among different generations. These differences, or "generational gaps," can lead to issues in the workplace between colleagues, as well as less efficient use of time and resources by law firm or company employees. Naturally, each of these concerns is amplified given difficult economic circumstances.
June 29, 2009Mike WalshFTC Issues over $12 Million In Redress Checks to Victims of '90 Credit Fraud
FTC Tells the House About ID-Theft Efforts
FTC Mission Statutes Involving Online Commerce
Firm Web Site Receives ABA Branding Accolade
Discovery Organization Launches Job ProjectJune 29, 2009ALM Staff | Law Journal Newsletters |A Los Angeles judge, ruling on a case of first impression, recently found that the federal CAN-SPAM Act pre-empts a California law designed to curb false and misleading commercial e-mails.
June 29, 2009Amanda BronstadNo one enjoys clearing rights. Checking that you may use content (whether on your Web site, in a publication, or for a performance) and won't be sued over it takes time and effort. And, for e-commerce counsel clients, that means more money.
June 29, 2009Stanley P. Jaskiewicz

