Data Security Fears Rise
e-Commerce professionals just aren't destined to get a good night's sleep. First there was the recession, slowing upgrades and new projects. Then lawyers using personal smartphones and tablets for work, raising confidentiality headaches. Now, a new challenge: Protecting against cyberattacks ' and convincing clients that the firm is doing this job well.
Features
Duane Morris Brings Early Case Assessment In-House
With a view to addressing a market imbalance ' litigation clients demanding better early case assessment, and commercial providers not developing tools to meet that need ' Duane Morris litigators handed the firm's technology team a mandate: Help us develop a system to assist our clients in the resolution of the ubiquitous try-or-settle conundrum and, in the process, position the firm to capture more litigation business.
Features
Office 365 Cloud Computing
The world is getting smaller as technology changes enable us to share documents with those on the other side of the globe. When sharing documents "in the cloud" it is possible to see real-time updates when using the Microsoft 365 Office Web Apps. As most legal documents are created in Word, this column will focus on the Word Web App.
How Legal Services Can Maintain Profitability in a Shifting Landscape
Since the 2008 economic downturn, the U.S. legal market has undergone a permanent restructuring. With huge firms collapsing due to crippling debt, we see that legal services firms are no longer untouchable. The legal environment has become increasingly challenging as competition has increased, demand for legal services has remained flat, and firms are being forced to adopt more efficient, cost-effective and strategic business models.
Features
How Metadata Changed the Outcome of a Complex Employment Case
By definition, metadata is data about data. For computer files, it includes metadata fields that are hidden to typical users. This information can be valuable for a court case, and it goes beyond standard electronic discovery data collection: it must be gathered and analyzed by a digital forensics specialist.
Features
Practical Pathways for the Next Generation of e-Discovery Professionals
The e-discovery industry has come a long way in a short period of time. Fifteen years ago, the career path of an aspiring legal technology professional was quite uncertain. However, over time, clearer career trajectories have begun to emerge based on the career choices of pioneer ' and now veteran ' e-discovery professionals. Analyzing the divergent hiring strategies of service providers and law firms helps reveal those career trajectories.
Features
<i>Online Extra:</i> Hulu Loses Bid to Short Circuit Privacy Case
U.S. Magistrate Judge Laurel Beeler ruled Hulu's alleged disclosure of users' viewing selections is enough to sustain claims under the Video Privacy Protection Act.
Features
Are States Taking the Lead to Enforce Digital Privacy Laws?
Recently, 37 states and the District of Columbia reached a $17 million dollar settlement with Google over its intentional circumvention of Internet users' privacy settings. The case stemmed from 'Google's bypassing of privacy settings in Apple's Safari browser to use cookies to track users and show them advertisements in 2011 and 2012. In total, Google has paid approximately $40 million dollars to federal and state regulators for intentionally harming the personal privacy rights of Internet users.
Columns & Departments
IP News
Federal Circuit Affirms Dismissal of Customer's Third-Party-Beneficiary Claim under First-to-File<br>Supreme Court Applies Atlantic Marine Standard to Forum Dispute in Patent Case<br>Claimed Inventions Falling within Prior Art Ranges Require Secondary Considerations to Show Nonobviousness
Features
Understanding Your Firm's Culture
A systematic approach to successfully managing cultural change as a firm pursues its strategic goals.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- Surveys in Patent Infringement Litigation: The Next FrontierMost experienced intellectual property attorneys understand the significant role surveys play in trademark infringement and other Lanham Act cases, but relatively few are likely to have considered the use of such research in patent infringement matters. That could soon change in light of the recent admission of a survey into evidence in <i>Applera Corporation, et al. v. MJ Research, Inc., et al.</i>, No. 3:98cv1201 (D. Conn. Aug. 26, 2005). The survey evidence, which showed that 96% of the defendant's customers used its products to perform a patented process, was admitted as evidence in support of a claim of inducement to infringe. The court admitted the survey into evidence over various objections by the defendant, who had argued that the inducement claim could not be proven without the survey.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
