Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Cyberinsurance for Data Security Risks Image

Cyberinsurance for Data Security Risks

Ed Poll

The harms that can result from computer security breaches are largely uncovered by the types of insurance policies most law firms maintain. Combined with the inadequate security most law firms provide for client data, the resultant risk exposure arguably violates legal professional ethics. A firm's failure to adequately protect computer-based master files, time-and-billing records, court filings, wills, powers of attorney, corporate records, and other client-related materials is a violation of bar association requirements to preserve client files and more generally a failure in the firm's overall duty to act competently in the best interests of its clients.

Third Circuit Upholds FCC's Deregulation of High-Speed Internet Access Image

Third Circuit Upholds FCC's Deregulation of High-Speed Internet Access

Shannon P. Duffy

In a victory for big telephone companies, a federal appeals court has upheld a ruling by the FCC that effectively deregulated high-speed Internet access service provided over traditional telephone lines.

Features

<b>BREAKING NEWS:</b> RIAA Wins File-Sharing Suit Image

<b>BREAKING NEWS:</b> RIAA Wins File-Sharing Suit

Steven Salkin

A Minnesota woman was found guilty oif illegally downloading music onto her computer -- to the tune of $222,000, a jury decided in federal court in Duluth on Oct. 4.

Features

Detailed Billing Image

Detailed Billing

Zusha Elinson

Today's bills are as thick as case files, and at least as detailed. Concerned over what lawyers are doing with their time and who's working on a matter ' whether to track diversity or to keep expensive but inexperienced first-year associates off the case ' clients demand exhaustive accounting from their outside counsel.

Cyberinsurance for Data Security Risks Image

Cyberinsurance for Data Security Risks

Ed Poll

The harms that can result from computer security breaches are largely uncovered by the types of insurance policies most law firms maintain. Combined with the inadequate security most law firms provide for client data, the resultant risk exposure arguably violates legal professional ethics. A firm's failure to adequately protect computer-based master files, time-and-billing records, court filings, wills, powers of attorney, corporate records, and other client-related materials is a violation of bar association requirements to preserve client files and more generally a failure in the firm's overall duty to act competently in the best interests of its clients.

Features

Normalizing Mix Variables in Financial Data Image

Normalizing Mix Variables in Financial Data

Ron Paquette

Most law firm managers understand the importance that business analysis plays in steering a firm toward success. However, as with so many things in life, a little bit of analysis can be a dangerous thing. Management reporting processes typically collect, organize, and ultimately combine data sets from different practice areas, offices, industries, etc. Superficial reports compare aggregate characteristics (<i>e.g.</i>, top-line results) without identifying the varying components contained within the data sets and normalizing for these variables. This can lead those who examine such reports to draw misleading or even totally wrong conclusions.

Features

How Widespread Is Unethical Billing? Image

How Widespread Is Unethical Billing?

William G. Ross

Aside from a few sensational disbarments and criminal prosecutions for overbilling, most evidence of billing irregularities is anecdotal. In order to provide a more precise assessment of the scope of the abuse of time-based billing by attorneys, I conducted nationwide surveys of outside counsel in 1991, 1995, and 2007. The large majority of respondents to all three surveys ' 82% in the most recent survey ' indicated that time-based billing was their dominant method of billing.

Products As Witnesses Image

Products As Witnesses

Michael Hoenig

Because of the importance of the 'crown jewels,' litigants should be assiduous in trying to locate and preserve the accident-involved product and in trying to assure the integrity of its custody and condition from the time of the accident. Indeed, a failure to do so can result in spoliation-of-evidence sanctions.

Features

Movers & Shakers Image

Movers & Shakers

ALM Staff & Law Journal Newsletters

News about lawyers and law firms in the product liability field.

Features

Case Notes Image

Case Notes

ALM Staff & Law Journal Newsletters

Highlights of the latest commercial leasing cases from around the country.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›