Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Litigation Image

Litigation

ALM Staff & Law Journal Newsletters

Recent cases of interest to your practice.

October issue in PDF format Image

October issue in PDF format

ALM Staff & Law Journal Newsletters

October issue in PDF format Image

October issue in PDF format

ALM Staff & Law Journal Newsletters

Features

Courthouse Steps Image

Courthouse Steps

ALM Staff & Law Journal Newsletters

Recently filed cases in entertainment law, straight from the steps of the Los Angeles Superior Court.

Full October issue in PDF format Image

Full October issue in PDF format

ALM Staff & Law Journal Newsletters

October issue in PDF format Image

October issue in PDF format

ALM Staff & Law Journal Newsletters

Features

V4 Signals A New Path Image

V4 Signals A New Path

Cindy Langan

Recently, at Miller, Canfield, Paddock and Stone, P.L.C., we identified a need to reduce the number of e-mails our team was exchanging with our clients to send versions of documents and felt that the solution should be in the form of a central repository for all of our information. After analyzing a Citrix solution and deciding we weren't willing to devote an entire server to third-party dial-in access plus the costs of the underlying software, we looked at iCONECT, which recently re-launched its flagship product, (previously known as simply as iCONECT), giving it the moniker "V4." Everyone involved in our in-house review really liked how we could store documents, transcripts, images, calendars and case information in one place.

Features

<B><I>Practice Tip</b></i> Protecting Against Metadata Mishaps Image

<B><I>Practice Tip</b></i> Protecting Against Metadata Mishaps

William Robertson

Whenever you create, open or save a document using any Microsoft Office application (<i>eg</i>, Word), the document may contain "metadata" - embedded information that you may not know about because it is usually hidden on screen. Metadata is used to enhance several Word functions, such as editing, viewing, filing and document retrieval. Harmless, right? Well, that depends on the type of metadata, the document's method of distribution and your firm's and clients' privacy needs.

<b><i>Case Study</b></i>Implementing Knowledge Management at Rider Bennett Image

<b><i>Case Study</b></i>Implementing Knowledge Management at Rider Bennett

Jamie Blomquist

Like many legal and technology professionals, I've been aware that knowledge management (KM) was coming. I've spent the past few years getting the word out to the right people so they were familiar with the concept and researching the potential impact that it would have at our firm.

Features

X1: A Rocket Ship into Computer Archives Image

X1: A Rocket Ship into Computer Archives

Alan Pearlman

Finding files on one's computer can be, to say the least, a tedious and time consuming job that sometimes comes up empty handed. When you couple that with the stresses of putting out documents in a law firm, day in and day out, the job now pushes its way up to a monumental task! One would think that this topic should have been covered years ago, and done in fine fashion at the dawning age of computers. But alas, no such product has come along to make the chore less of a chore. To boot, most of the present day market products are not very handy when it comes to finding files on your office hard disks, but now a very new product makes the search fast ' and furiously good

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Inferring Dishonesty: The Fifth Amendment and Fidelity Coverage
    Dishonest employees always have posed a problem for businesses. The average business may lose 6% of its annual revenues to employee fraud, and cumulatively the impact of employee theft on the economy is estimated to be $600 billion annually. <i>See</i> Association of Certified Fraud Examiners ("ACFE"), 2002 Report to the Nation on Occupational Fraud &amp; Abuse, at ii, 4 (2002), available at <i>www.cfenet.com/publications/rttn.asp.</i> Although the average loss through employee embezzlement is $25,000, where computerized financial records or transactions are involved, the average loss increases nearly twentyfold. <i>See</i> National White Collar Crime Center, <i>WCC Issue: Embezzlement/Employee Theft,</i> at 2 (2002), available at <i>http://nw3c.org/downloads/Computer_Crime_Weapon.pdf.</i>
    Read More ›
  • The Anti-Assignment Override Provisions
    UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?
    Read More ›