Columns & Departments
<b><i>e-Discovery Tech:</b></i> Why the FRCP Amendments Mean Legal Teams Need Technology Now More Than Ever
Across organizations, a similar process (more or less) is followed when conducting e-discovery, but the steps often happen in quick succession or nearly simultaneously. The steps are loosely defined by the FRCP and the judicial interpretation that flows from them. The recent changes to the FRCP will inevitably result in the steps shifting and evolving in the coming months and years.
Features
Is Your Printer A Gateway For Hackers? Five Tips for a Secure Printer
Printers can contain sensitive information, or can be an entry point for hackers. It's imperative that law firms shield printers against hackers.
Features
Online e-Discovery Ethics
Although attorneys are rapidly becoming familiar with structuring digital data requests and responding to those requests in a way that is thorough, but reasonable, most attorneys feel at sea in the e-discovery ethics arena.
Features
Patchwork Paid Sick Leave Laws
When it comes to initiating employment legislation, we're living in a time when state and city lawmakers are the change agents. From adopting equal pay legislation to raising the minimum wage or instituting paid parental leave, inaction by the United States Congress has resulted in many states and cities taking matters into their own hands.
Features
Tax Reporting Laws Raise Privacy Claim Risks for Online Companies
States are scrambling to shore up sales tax revenues that are eroding because of e-commerce sales. A new approach to sales tax collections involves information reports on customers' online purchases. This approach may create potential legal claims against many online companies for giving too much information about customers to state tax agencies or even to the customers themselves.
Features
The New FCPA Cooperation Plan
On April 5, 2016, the DOJ issued an Enforcement and Guidance Plan concerning the FCPA. While the new Plan could be interpreted as a novel departure from past precedent, careful analysis reveals that it does little to alter or clarify how the DOJ will review cases or reward companies for significant cooperation in addressing anti-corruption global issues.
Features
How to Understand and Protect the Data in Your Enterprise
Especially in a time where cybersecurity remains in the headlines on a regular basis, it's crucial to understand what data exists in order to protect it. Where's your data? What if you lost track of some of it? What if attackers copied it?
Features
EU-U.S. Privacy Shield Finalized
The European Commission concluded more than six months of negotiations both within the EU institutions and with the U.S. on July 12 with the announcement that an agreement had been reached on the Privacy Shield scheme to transfer data from the EU to the U.S.
Features
Six Keys to a Successful Law Firm Merger
Over the past two years I have been involved in three merger situations and I am currently working on two more. I have come away with six factors that, I believe, determine the success or failure of law firm merger discussions.
Columns & Departments
<b><i>Legal Tech:</b></i> Modernizing Litigation Practice: What Can the U.S. Learn from Electronic Courtrooms and Paperless Trials Abroad?
Legal professionals interested in the next wave of innovation in litigation technology can look overseas to the developments over the last several years in the UK and Singapore.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- "Holy Fair Use, Batman": Copyright, Fair Use and the Dark KnightThe copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.Read More ›