In November 2013, I surveyed 26 predominantly administrative professionals throughout Fortune/Global 500 law departments. In addition to questions related to pricing predictions for hosting, review, processing, the future of predictive coding, the trend towards growing in-house teams and the expansion of managed services, I asked for their impressions of certain leading vendors in the market.
- June 02, 2014Ari Kaplan
To be successful in generating new business and attracting new clients, it is essential to speak the language of your target clients. Furthermore, lawyers should actually use the words that clients want to hear.
June 02, 2014Larry BodineWhy things tend to go off the rails related to conducting a successful introductory meeting with a potential target (prospective client).
June 02, 2014Bruce AlltopThe answer depends, in part, on where the debtor's case is pending. In the Second Circuit, courts allow defendants to escape exposure to fraudulent transfer actions if the debtor's estate cannot identify at least one general unsecured creditor who would benefit from a recovery in that litigation. Not so in other courts.
June 02, 2014Paul A. Rubin and Leslie W. ChervokasIncreased concern about international child abductions has led the Department of Homeland Security and the State Department to institute certain policies and procedures for single parents travelling internationally with a child. Practitioners should pay attention to these special considerations, particularly with summer travel on the horizon.
June 02, 2014ALM Staff | Law Journal Newsletters |It is almost impossible to open a newspaper today without reading about cybersecurity breaches. Target Corp., Neimann Marcus and many other companies have been targeted, and many experts think it is only a matter of time until law firms are targeted (if it's not too late already). All this "cyber risk" may have you pining for the days before computers, when almost all information was stored on paper.
June 02, 2014John GilbertToday's lease exhibits are more numerous, have greater detail and often make up major terms and provisions of the lease. They need to be prepared and negotiated early in the lease preparation and negotiation process.
June 02, 2014Steven J. RobertsOnline counterfeit sellers are increasingly more sophisticated and are engaging in social media counterfeiting to exploit social media tools to bolster their sales of counterfeit products online.
June 02, 2014Camille M. Miller and Elizabeth Lai FeathermanCybersecurity and data protection, more than ever, are priority items for the government and private sector. The government has reacted by proposing legislative "fixes" that would require organizations to satisfy basic levels of cybersecurity protection and disclose breaches or face fines. Whether a mandatory compliance model will be effective given the rapid pace by which technology advances is unclear. It may be unrealistic to expect the government's legislative pace to keep up with hackers.
June 02, 2014Jonathan S. Feld, Susan E. Asam and Leyton NelsonThis article is the first installment of a four-part series offering a model for attorneys to use when faced with the task of deconstructing a forensic custody assessment.
June 02, 2014Jeffrey P. Wittmann, David A. Martindale and Timothy M. Tippins

