Ex-partners Lose Bid To Speed Funds from Fish & Neave
Nixon Peabody Employees On Board at Piper
Pillsbury Strikes Oil
- May 31, 2005ALM Staff | Law Journal Newsletters |
So much has been written about knowledge management in the past 10 years and so many products purporting to enable knowledge management have been pushed on the legal community, that I am not sure that the term is relevant anymore. However, I have always thought some of the main tenets of KM make a lot of sense.
An exciting project that we are rolling out at Baker Donelson starting this month conforms to those main tenets of KM.May 31, 2005John D. GreenIf you haven't already seen a couple reviews of Acrobat 7.0, you must not be reading much legal tech trade literature! I've caught at least half a dozen already. Adobe Systems has accompanied the release of their latest version with quite a media blitz, at least in the legal sector. And for good reason. The Acrobat product family encompasses a host of features highly useful for legal professionals.
May 31, 2005Marc LauritsenBryan Cave LLP is an 800-lawyer firm with litigators in eight U.S. cities and London. In 2002, the firm asked me to evaluate our litigation technology and litigation support services. For better or worse, we had neither budget nor staff during the first 9 months. While we could not affect any immediate change, this was the ideal opportunity to do a needs assessment, survey the available technology, evaluate the trends in the market, and ultimately plan and budget for implementation.
May 31, 2005Mark BrennanWhile obvious security threats like fast-spreading worms have a tendency to garner news headlines, other stealthy security risks threaten law firms and other businesses every day. An increasing amount of spyware and adware programs have the ability to facilitate the disclosure of business information and risk privacy, confidentiality, integrity, and system availability. Law firms ' like other corporations ' usually accumulate a vault of information that could cause serious problems if it were shared with the wrong contacts or, even worse, stolen. Spyware's evolution from simple cookies to a range of sophisticated user-tracking systems has left many businesses without the control over their proprietary data and
A recent survey by IT industry analysts IDC identified spyware as the fourth greatest threat to enterprise security.May 31, 2005Sarah GordonThe U.S. District Court for the Southern District of New York decided that a former associate in a law firm can continue to represent one-time Lynyrd Skynyrd guitarist Ed King in a fee dispute between King and the associate's former firm.
May 27, 2005ALM Staff | Law Journal Newsletters |The U.S. District Court for the Southern District of New York decided that incorporating several thumbnail reproductions of concert posters into the book "Grateful Dead: The Illustrated Trip" without a copyright license from the plaintiff archive constituted a fair use.
May 27, 2005ALM Staff | Law Journal Newsletters |Record Distribution/Promissory Estoppel
Record Production Deals/Breach of ContractMay 27, 2005ALM Staff | Law Journal Newsletters |Recently filed cases in entertainment law, straight from the steps of the Los Angeles Superior Court.
May 27, 2005ALM Staff | Law Journal Newsletters |Bequeathing an interest in a copyright can involve a conflict between federal copyright law and state probate laws. The conflict may result in a situation in which it isn't clear whether the executor of the estate or the beneficiary of the specific bequest should deal with the property at various times. Specific terms in a will concerning a bequest of a copyright interest can avoid a possible dispute.
May 27, 2005Donald C. Farber

