Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Allen & Allen Leverages Aderant Integrated Case and Financial Management Image

Allen & Allen Leverages Aderant Integrated Case and Financial Management

Tracy Puritz

The primary reason we chose Aderant Total Office was because of integration and that very few of the vendors the firm considered could provide both case and financial management software.

Leveraging the Assets of the Law Library Image

Leveraging the Assets of the Law Library

Nina Cunningham

All firms are interested in saving money. And while the fastest route to savings is to cut personnel, this should not be the first approach. It limits the ability of a firm to grow and avoids the focus needed to reinvent the firm. If law firms take a good look at their opportunities to save money, they might find that eliminating physical assets, renegotiating high-priced contracts, and expanding the capabilities of flexible and capable personnel might provide better returns.

Features

Five Social Media Platforms from Which Any Law Firm Can Benefit Image

Five Social Media Platforms from Which Any Law Firm Can Benefit

Roe Frazer

Leveraging social media is the least expensive way to expand your business and brand your name. Business to consumer (B-to-C) companies long ago embraced the social Web as a way to connect with existing customers and attract new customers. These same methods and available outlets will work for law firms, too. And, you don't have to spend a lot of money with an outside ad agency or marketing firm to get the results you want.

Features

From Banker Box to Jury Box: How to Get Your Exhibits Ready for Trial Presentation Image

From Banker Box to Jury Box: How to Get Your Exhibits Ready for Trial Presentation

Michael Skrzypek

Back in the analog days, a parade of lawyers and paralegals would march into the courtroom right before a trial started, carrying dozens of bankers' boxes filled with documents and other evidence. Now, a trial presentation technician walks into the courtroom carrying just a laptop, but one loaded with a trial exhibit database that contains the equivalent of hundreds of bankers' boxes of material.

Webinar: Protecting Attorney-Client Privilege and Work Product: Solutions for Modern-Day Problems Image

Webinar: Protecting Attorney-Client Privilege and Work Product: Solutions for Modern-Day Problems

ALM Staff & Law Journal Newsletters

Find out how new technology and new work habits in modern legal practice put attorney/client privilege and work product confidentiality at risk.

Cybersecurity Legislation Near Image

Cybersecurity Legislation Near

Mark W. Menezes, Frederick R. Eames & Evan D. Wolff

On Nov. 15, the U.S. Senate declined to approve S. 3414, the Cybersecurity Act of 2012. The proposed legislation would have set voluntary cybersecurity standards for owners of the nation's critical infrastructure, such as gas pipelines, utilities and banks. In the absence of cybersecurity legislation, the Obama administration now is considering taking action through an executive order.

Obama Signs Safe Web Act Extension Image

Obama Signs Safe Web Act Extension

Lynn M. Cohen

On Dec. 4, 2012, President Obama signed into law H.R. 6131, a bill to reauthorize the U.S. Safe Web Act of 2006. The Safe Web Act authorizes the FTC authority to clamp down on Internet fraud and online scammers based abroad by expanding the FTC's powers so it can share information about cross-border online fraud with foreign law enforcement authorities.

Features

Internet Memes and Intellectual Property Risks Image

Internet Memes and Intellectual Property Risks

Scott J. Slavick

Internet memes ' those attention-getting images, videos, and catchy phrases that whip across the Internet via e-mail and social media ' have long been a part of online culture. But while a corporate strategy of exploiting memes can be highly entertaining and can capture consumers' attention, using these online assets can be risky if intellectual property rights are infringed in their dissemination.

Features

Social Media and the National Labor Relations Act Image

Social Media and the National Labor Relations Act

Anna Ferrari, Christine Lyon & Timothy Ryan

We offer below a set of frequently asked questions with answers distilling the key points that U.S. employers should understand about this new area of NLRA enforcement activity. These FAQs are accompanied by practical suggestions that technology counsel can use to help employers navigate these issues in drafting and updating their own social media policies.

Features

Applying Patent Teachings in Product Liability Cases Image

Applying Patent Teachings in Product Liability Cases

Anthony S. Volpe

In a product liability design defect action, evidence establishing the defectiveness of a product is paramount to a plaintiff's case. Conducting a patent search and an investigation of the state of the patent art may yield fruitful evidence regarding the defect or relative safety of the product at issue in a product liability action. But first some background to set the environment for how patents become patents.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Inferring Dishonesty: The Fifth Amendment and Fidelity Coverage
    Dishonest employees always have posed a problem for businesses. The average business may lose 6% of its annual revenues to employee fraud, and cumulatively the impact of employee theft on the economy is estimated to be $600 billion annually. <i>See</i> Association of Certified Fraud Examiners ("ACFE"), 2002 Report to the Nation on Occupational Fraud &amp; Abuse, at ii, 4 (2002), available at <i>www.cfenet.com/publications/rttn.asp.</i> Although the average loss through employee embezzlement is $25,000, where computerized financial records or transactions are involved, the average loss increases nearly twentyfold. <i>See</i> National White Collar Crime Center, <i>WCC Issue: Embezzlement/Employee Theft,</i> at 2 (2002), available at <i>http://nw3c.org/downloads/Computer_Crime_Weapon.pdf.</i>
    Read More ›