Lawyers leaving a law practice have an economic interest in monetizing their career-long investment in building a client portfolio and a referral network. How each lawyer has accomplished this depends on his or her particular practice, market and style. But while the means may vary, the results are the same ' access to clients who have legal needs. And this is the value the acquirers wish to capture.
- August 02, 2014James D. Cotterman
What is the DNA of an in-house e-discovery project manager ' and how can you become one, whether you are a lawyer or a technician? Let's define an in-house e-discovery project manager, examine in-house corporate hiring trends and endeavor to understand what the corporate appetite is for grooming talent or, conversely, for hiring experienced e-discovery professionals.
August 02, 2014Jared CosegliaThis article goes beyond the nuts and bolts of how to respond to a data-breach incident, and offers some lessons learned from the frontlines of the cybersecurity war to help companies successfully navigate the legal and public-relations minefield that ensues.
August 02, 2014Mark Mermelstein, Antony Kim and Robert UriarteEach day, businesses become progressively more dependent on computers and the Internet to gather, store and protect information. But, as sophisticated as this technology may be, it has also proven to be susceptible to breaches, which have time and again resulted in the unauthorized access of confidential information.
August 02, 2014Ellen Farrell and Kathryn LinskyAnti-waiver provisions in state franchise acts have traditionally been used to trump the venue designated in the franchise agreement and to successfully transfer venue to the franchisee's home state. However, a recent decision from the U.S. District Court for the Eastern District of Michigan has added weight to a small but growing body of cases enforcing forum-selection clauses against franchisees that operate in states with franchise acts containing anti-waiver provisions.
August 02, 2014Fredric A. Cohen and Allison R. GrowCyberattacks are increasing at a startling rate in the business community, not only by hackers for personal intellectual skullduggery, but cyberattacks aimed at obtaining sensitive information. Law firms have become major targets of these illegal attacks, which are aimed at discovering and pilfering the entire subject matter of a commercial operation.
July 02, 2014Peter F. VairaE-commerce counsel would do well to familiarize themselves with the ongoing process of reforms to the EU data protection rules due to their eventual compliance impact and because they constitute more than a simple upgrade to the existing rules.
July 02, 2014Andr' BywaterThis edition of the Quarterly State Compliance Review looks at some legislation of interest to corporate lawyers that went into effect between May 1 and July 1, 2014 as well as some recent cases of note.
July 02, 2014Sandra FeldmanBig data has taken the world by storm. From its origins as a technical solution for Internet search engines and online retail sales, it has spread across business, science and now government. Big data tools have shown extraordinary power to quickly sort and analyze data, both structured and unstructured. Ultimately, the power of big data resides in its ability to identify signals or patterns in vast data sets.
July 02, 2014John. H. WalshIn Nautilus, Inc. v. Biosig Instruments, Inc., a unanimous Supreme Court held that the test for patent claim definiteness in 35 U.S.C. '112, '2 (2006) "require[s] that a patent's claims, viewed in light of the specification and prosecution history, inform those skilled in the art about the scope of the invention with reasonable certainty."
July 02, 2014Darren Donnelly

