Account

Sign in to access your account and subscription

LJN Newsletters

  • Despite our firm's technological savvy, the burden of growing discovery volumes was challenging to manage. We were experiencing performance and workflow issues on all cases with over 150,000 documents, forcing us to send the larger cases to outside vendors, adding time and cost to every case. Our goal was to find a new in-house solution that could process and search vast amounts of data quickly and provide our attorneys with powerful analytic tools to use in early case assessment (ECA) and strategy development.

    August 02, 2015B.B. Neely
  • Analysis of a case in which a California Court of Appeal affirmed the right of a shopping center owner to limit the First Amendment rights of citizens from being exercised near store entrances.

    August 02, 2015ALM Staff | Law Journal Newsletters |
  • Storing and sharing data "in the cloud" has become, in many instances, a business necessity. The practical and economic advantages of cloud computing are clear ' it eliminates the need to send client data via traditional, costly methods, and is significantly less expensive than building and maintaining the same data storage capacity in-house.

    August 02, 2015Gregory Mottla and L. Elise Dieterich
  • In any business purchase, investment, merger or acquisition, several threshold questions come to mind. What assets are being acquired? Where is the value in the target company? What liabilities are being acquired? How should these be valued for pricing and future growth? What will the acquirer do with the target company? How far can management take the new target?

    August 02, 2015Craig R. Tractenberg
  • Whether you are an in-house communications manager or a PR consultant, every day presents new challenges. With experience, how you respond may become automatic, while others require more in-depth thinking for solutions.

    August 02, 2015Vivian Hood
  • Courts are increasingly ordering counsel to identify and produce information beyond traditional e-mail and loose files. Whether its employee and payroll data related to a wage and hour dispute or trade data related to a market manipulation investigation, understanding the EDRM as it relates to increasingly larger volumes of structured data has never been a more critical e-discovery capability.

    August 02, 2015Wendy Predescu and Philip Zimmermann
  • Cybersecurity is at a crossroads. No longer resigned to the confines of server rooms overseen by information technology, decisions regarding the protection of data have been forced into the boardroom by events that include breaches at main street businesses and revelations of clandestine government hacking activities.

    August 02, 2015Chris DiMarco
  • As technological advancements force most of the entertainment industry to evolve or become extinct, the traditional cable TV bundle continues virtually intact. Yet, according to a 2014 Nielsen report, while the average U.S. television-watching home receives 189 channels, TV watchers consistently tune in to just 17. And a steady stream of customers has cut the cable cord altogether in favor of accessing content from alternative sources.

    August 02, 2015David L. Yohai and Theodore E. Tsekerides
  • Data protection is the responsibility of every individual in the company, and the legal and IT departments should only be drafting contractual languages, policies, and guidelines while working in tandem with each other.

    August 02, 2015Kristoph Gustovich
  • The U.S. Supreme Court, in Kimble v. Marvel, stood by its decision in Brulotte, reaffirming that post-expiration patent royalty provisions are unlawful per se and therefore unenforceable.

    August 02, 2015Sarah Goodman and Greg Chrisman