Account

Sign in to access your account and subscription

Register

LJN Newsletters

  • In November 2013, I surveyed 26 predominantly administrative professionals throughout Fortune/Global 500 law departments. In addition to questions related to pricing predictions for hosting, review, processing, the future of predictive coding, the trend towards growing in-house teams and the expansion of managed services, I asked for their impressions of certain leading vendors in the market.

    June 02, 2014Ari Kaplan
  • To be successful in generating new business and attracting new clients, it is essential to speak the language of your target clients. Furthermore, lawyers should actually use the words that clients want to hear.

    June 02, 2014Larry Bodine
  • Why things tend to go off the rails related to conducting a successful introductory meeting with a potential target (prospective client).

    June 02, 2014Bruce Alltop
  • Increased concern about international child abductions has led the Department of Homeland Security and the State Department to institute certain policies and procedures for single parents travelling internationally with a child. Practitioners should pay attention to these special considerations, particularly with summer travel on the horizon.

    June 02, 2014ALM Staff | Law Journal Newsletters |
  • It is almost impossible to open a newspaper today without reading about cybersecurity breaches. Target Corp., Neimann Marcus and many other companies have been targeted, and many experts think it is only a matter of time until law firms are targeted (if it's not too late already). All this "cyber risk" may have you pining for the days before computers, when almost all information was stored on paper.

    June 02, 2014John Gilbert
  • Today's lease exhibits are more numerous, have greater detail and often make up major terms and provisions of the lease. They need to be prepared and negotiated early in the lease preparation and negotiation process.

    June 02, 2014Steven J. Roberts
  • Online counterfeit sellers are increasingly more sophisticated and are engaging in social media counterfeiting to exploit social media tools to bolster their sales of counterfeit products online.

    June 02, 2014Camille M. Miller and Elizabeth Lai Featherman
  • Cybersecurity and data protection, more than ever, are priority items for the government and private sector. The government has reacted by proposing legislative "fixes" that would require organizations to satisfy basic levels of cybersecurity protection and disclose breaches or face fines. Whether a mandatory compliance model will be effective given the rapid pace by which technology advances is unclear. It may be unrealistic to expect the government's legislative pace to keep up with hackers.

    June 02, 2014Jonathan S. Feld, Susan E. Asam and Leyton Nelson
  • This article is the first installment of a four-part series offering a model for attorneys to use when faced with the task of deconstructing a forensic custody assessment.

    June 02, 2014Jeffrey P. Wittmann, David A. Martindale and Timothy M. Tippins