The 'Big Picture'
Let's say you're the firm's chief marketing officer. You're about to sit down with the managing partner to discuss the firm's marketing efforts and how they fit into its overall business strategy. Here are 10 questions you should be prepared to answer clearly and concisely.
Technology Conversions: More Than Just Software
A recent asset finance industry conference I attended showcased the new generation of technology platforms being introduced to the market. Most of the presentations to the inquisitive audience focused on the pure functionality of the various software programs ' their capabilities and limitations.
Bringing Paper Legal Documents Into Electronic Systems
In the legal industry, it's very clear that paper is here to stay. Whether it's pleadings, filings, evidence, exhibits, or other documents, paper formats are still a dominant factor in many law firms today. As much as we want to reduce its presence for numerous reasons, that tide of paper isn't going away. In fact, for some firms, it continues to rise. That's why law firms of all sizes need non-disruptive strategies that support efficient 'coexistence' of paper and electronic documents and records.
Mobile E-discovery Can Keep Secrets Secret
Fulfilling a discovery request is a huge challenge for any company ' the stress of litigation, the expense of dredging through gigabytes and even terabytes of documents and files, and the disruption to every businessperson who may have sent an e-mail about the matter in contention can make for a difficult situation in the best of circumstances. But there are also security concerns. As a corporation's information is moved around, restored and sent to and from outside counsel, highly sensitive trade secrets and private data may be at risk every time discovery materials leave corporate offices.
E-mail Formatting Can Affect Content Delivery
E-mail is a convenient and powerful method of communication with billions of e-mail messages transmitted everyday. As common as e-mail is however, there is still some mystery concerning the use of e-mail programs and the types of corresponding message formats. Why is this worth discussing? Because message formats have a direct effect on how text and text formatting are displayed, the size of the messages, and if the message text is received at all.
Features
Protection Against Today's Network Attacks Begs for Unified Approach
The increasingly complex security environment is fueling an innovative approach to network security called Unified Threat Management (UTM) that consolidates and integrates all of the major threat protection services into a single device. UTM can save time and money and redirect IT resources back to the business of improving the practice of law.<br>Even as companies are spending billions on sophisticated new security hardware and software, current research indicates that corporate networks are being successfully attacked. Data compromises are common. This article outlines the root causes for computer network vulnerabilities and how law firms can ensure better security and more efficient use of their security-related investments.
Features
Risk Management and Basel II: Time to Start Thinking About a Solution
Over the last several years, governments around the world have been passing regulations to ensure the integrity of the global financial system. One such regulation is Basel II.
Features
Supreme Court Sides with Employees in Discrimination Case
The Supreme Court ruled unanimously on June 22 to give broad protection under Title VII of the Civil Rights Act to employees who suffer retaliation for complaining about workplace discrimination. <br>The decision in <i>Burlington Northern & Santa Fe Railway Co. v. White</i> ends disarray among lower courts on the standard required to assess retaliation claims, but employment lawyers say it will trigger a wave of new litigation to determine what kind of employer actions constitute illegal retaliation.
Features
Lawyers' Suit over Taping Client Conversations Proceeds
Legal Aid lawyers claiming the government violated their rights by secretly recording attorney-client communications with 9/11 detainees won a major battle in June when a federal judge permitted the bulk of the action to proceed. <br>The case is unusual in that it centers on the rights and privileges of lawyers operating behind the attorney-client shield, rather than on the rights of the clients.
Features
Succession Planning Is Essential for Law Firm Survival
A major challenge law firms face today is the continued aging of their partnerships. One of the principal reasons for this is that 'baby boomers' are approaching retirement. While this is a problem for all businesses and professions in the United States, it is particularly serious for law firms because it poses a threat to their future survival. While many senior partners are both physically and mentally able to continue practicing, firms are beginning to recognize that succession planning, for both client and management responsibilities, has become essential if the firms are to continue in existence.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- When It Comes to Trademark Searches, AI Misses the MarkArtificial intelligence tools powered by large language models have become valuable resources in the trademark process. Despite incredible progress in natural-language reasoning, AI tools still face fundamental limitations when it comes to performing even basic trademark searches. Here are five important reasons why.Read More ›
