Losing Grasp Of Technology
Let me say one word: Internet. Now, how about a couple more: Broadband Access. It's my contention that the security problems we face today in the forms of unsolicited e-mail, virus infection, phishing scams and the dreaded identity-theft issues are the direct result of giving access to powerful computers attached to the Internet via broadband access to users who are unqualified to own, use and operate such technology.
Features
Mastering And Managing Documents
The attorney's own realm is no different from any other revenue-generating quarter -- e-commerce or good old-fashioned bricks and cement -- in one truism of the Technology Age: Document management is the most daunting challenge for today's law office. Regardless of the size of the law firm, mountains of file folders and forests of paper are piling up daily in every law office as quickly, and as momentously, as in the offices of their clients. Traditionally, the answer to this challenge has been to hire more clerical staff, more paralegals, and more attorneys and then to scramble to assess and assign outsourcing contracts to help erode some of the paper mountains popping up all around the legal-office landscape.
Solo Aims To Blog His Way To New Clients
The small town of Storrs, CT, may soon become the center of the law-blog universe. Andrew W. Ewalt, a solo practicing in the shadows of the University of Connecticut, is a guinea pig for the wildly growing technology, which to date has largely been passed over by the legal profession as a marketing tool.
Features
Not All Property Rights Are Created Equal
You've been there and know the terrain: The law breaks property into two categories -- real and personal. If the object of a transaction is found to be personal property, then it is subsequently categorized as either tangible or intangible. In the realm of interconnected networked computers, however, although broadly categorized as personal property, Internet property has characteristics of tangible and intangible property. Consequently, attorneys must take the special nature of Internet property into consideration when attempting to resolve or avoid legal difficulties relating to an Internet transaction, something, of course, to which e-commerce ventures find themselves at ongoing risk and dealing in round-the-clock daily.
Filtering Through Regulatory Compliance
The advantages of doing business in a digital economy -- paperless transactions, instant communication, effortless administration and reaching out across borders to far-away locations to collaborate with partners in a virtual community -- are precisely the risks of doing business in a digital economy.
Can You Keep A Secret?
When a number of blogs posted secret details and drawings of Apple Computer's new music technology -- code-named Asteroid -- Apple's lawyers did what lawyers do: They sued the Web sites to find out the posters' identities and sources.
Features
Subpoena For e-Mail
Every time someone hits the "send" button, evidence is created -- and electronic evidence is something with which e-commerce ventures, by their very e-nature, must be concerned. They must also come up with elements in their business-process plans to deal with compliance or other legal matters arising from e-mail.
Lawyers Seek Pass From Privacy Law
The American Bar Association and the New York State Bar Association, along with state bars nationwide that support the two groups, asked the U.S. Court of Appeals for the D.C. Circuit to rule once and for all that the Federal Trade Commission (FTC) has no right to hold lawyers to certain privacy provisions in the 1999 Gramm-Leach-Bliley Act.
Keeping Tabs On Internet Identity
No technology issue concerns -- or should concern -- individuals, e-commerce and government regulators more than Internet identity theft. The statistics are staggering. In the last year, LexisNexis reported that unauthorized people apparently took personal information on more than 30,000 Americans from its database -- by stealing logins and passwords of legitimate customers. Another data broker, ChoicePoint Inc., reported a possible theft of similar data from as many as 145,000 people through individuals claiming to have legitimate and legal use for the data they purchased from ChoicePoint. But those numbers look small (except, of course, to the affected individuals) when compared with the identity-theft problem acknowledged by Bank of America -- involving about 1.2 million federal employees.
Features
In the Marketplace
Highlights of the latest equipment leasing news from around the country.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Surveys in Patent Infringement Litigation: The Next FrontierMost experienced intellectual property attorneys understand the significant role surveys play in trademark infringement and other Lanham Act cases, but relatively few are likely to have considered the use of such research in patent infringement matters. That could soon change in light of the recent admission of a survey into evidence in <i>Applera Corporation, et al. v. MJ Research, Inc., et al.</i>, No. 3:98cv1201 (D. Conn. Aug. 26, 2005). The survey evidence, which showed that 96% of the defendant's customers used its products to perform a patented process, was admitted as evidence in support of a claim of inducement to infringe. The court admitted the survey into evidence over various objections by the defendant, who had argued that the inducement claim could not be proven without the survey.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
