Features
e-Discovery Techniques For Filtering Responsive Data
As most e-discovery vendors will happily tell you, 99% of all new business information is being created and stored electronically, and an estimated 60 billion e-mail messages are sent daily in the U.S. Sifting through all this data in a meaningful manner requires strategic thinking. On one hand, parties have an obligation ' and courts have created incentives ' to be fully forthcoming on electronic discovery requests. On the other hand, processing and reviewing data collected from hundreds of desktops and servers can become very expensive. During the e-discovery search process, even the most strategic keyword selections can leave a lot to be desired. Even case-specific terms may generate a lot of hits, but it may also produce more false positives than relevant material. Creating a strategic plan for data filtering through a well-researched selection of keywords and file types helps to ensure efficiencies in cost, time and resources, while generating fully forthcoming materials.
Data Mapping: The Common Thread Between Litigation Preparedness and Data Security
In today's world, most business activity creates electronically stored information ('ESI') ' whether it's an e-mail, document, voice-mail or database transaction ' and the exponentially increasing volume and diversity of those digital files at corporations represents exponentially increasing corporate risk. However, according to a survey of corporate counsel attorneys, only 7% of them rate their companies as prepared for the electronic discovery amendments to the FRCP. This lack of preparedness is not surprising since, until recently, many in-house legal departments have taken a back seat and let outside counsel manage their discovery needs.
Cyberinsurance for Data Security Risks
The harms that can result from computer security breaches are largely uncovered by the types of insurance policies most law firms maintain. Combined with the inadequate security most law firms provide for client data, the resultant risk exposure arguably violates legal professional ethics. A firm's failure to adequately protect computer-based master files, time-and-billing records, court filings, wills, powers of attorney, corporate records, and other client-related materials is a violation of bar association requirements to preserve client files and more generally a failure in the firm's overall duty to act competently in the best interests of its clients.
Third Circuit Upholds FCC's Deregulation of High-Speed Internet Access
In a victory for big telephone companies, a federal appeals court has upheld a ruling by the FCC that effectively deregulated high-speed Internet access service provided over traditional telephone lines.
Features
<b>BREAKING NEWS:</b> RIAA Wins File-Sharing Suit
A Minnesota woman was found guilty oif illegally downloading music onto her computer -- to the tune of $222,000, a jury decided in federal court in Duluth on Oct. 4.
Features
Detailed Billing
Today's bills are as thick as case files, and at least as detailed. Concerned over what lawyers are doing with their time and who's working on a matter ' whether to track diversity or to keep expensive but inexperienced first-year associates off the case ' clients demand exhaustive accounting from their outside counsel.
Cyberinsurance for Data Security Risks
The harms that can result from computer security breaches are largely uncovered by the types of insurance policies most law firms maintain. Combined with the inadequate security most law firms provide for client data, the resultant risk exposure arguably violates legal professional ethics. A firm's failure to adequately protect computer-based master files, time-and-billing records, court filings, wills, powers of attorney, corporate records, and other client-related materials is a violation of bar association requirements to preserve client files and more generally a failure in the firm's overall duty to act competently in the best interests of its clients.
Features
Normalizing Mix Variables in Financial Data
Most law firm managers understand the importance that business analysis plays in steering a firm toward success. However, as with so many things in life, a little bit of analysis can be a dangerous thing. Management reporting processes typically collect, organize, and ultimately combine data sets from different practice areas, offices, industries, etc. Superficial reports compare aggregate characteristics (<i>e.g.</i>, top-line results) without identifying the varying components contained within the data sets and normalizing for these variables. This can lead those who examine such reports to draw misleading or even totally wrong conclusions.
Features
How Widespread Is Unethical Billing?
Aside from a few sensational disbarments and criminal prosecutions for overbilling, most evidence of billing irregularities is anecdotal. In order to provide a more precise assessment of the scope of the abuse of time-based billing by attorneys, I conducted nationwide surveys of outside counsel in 1991, 1995, and 2007. The large majority of respondents to all three surveys ' 82% in the most recent survey ' indicated that time-based billing was their dominant method of billing.
Products As Witnesses
Because of the importance of the 'crown jewels,' litigants should be assiduous in trying to locate and preserve the accident-involved product and in trying to assure the integrity of its custody and condition from the time of the accident. Indeed, a failure to do so can result in spoliation-of-evidence sanctions.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- When It Comes to Trademark Searches, AI Misses the MarkArtificial intelligence tools powered by large language models have become valuable resources in the trademark process. Despite incredible progress in natural-language reasoning, AI tools still face fundamental limitations when it comes to performing even basic trademark searches. Here are five important reasons why.Read More ›
