Features
A Practical Primer On Production Format Requests
The electronic format that electronically stored information is produced in is a necessary component of e-discovery. This article offers a primer on production format issues by diagramming a template request in order to explain both the technical meaning and practical significance of the terms.
Features
Understanding Bias in Workers' Comp Medical Exams
The reality of workers' compensation life is that "bias" is rampant in the system ' especially when it comes to medical proof presented in litigated matters. This inherent bias should be scrutinized in full context.
Features
FATCA's Due Diligence Expansion
In 2010, Congress enacted the Foreign Account Tax Compliance Act (FATCA) in order to target U.S. taxpayers using offshore accounts to hide monies overseas. Although Congress' purpose and intent in passing FATCA was met, it has been achieved at a cost of imposing heavy burdens on those already compliant.
Features
Cybersecurity Data Sharing Now Available To Law Firms
Law firms now have access to a platform that allows them to share data on cybersecurity threats anonymously.
Features
e-Mail Risk Mitigation For Law Firms
Each day, attorneys create and handle documents that require strict confidentiality to avoid loss of evidentiary privileges. In today's digital workplace, many of these files are exchanged via e-mail. While e-mail allows for convenience, speed and portability, each attorney using e-mail must ask before sending: "Am I putting my client's confidentiality needs and expectations, as well as my ethical obligations, at risk?"
Features
Online Impersonation Continues, With Varying Consequences
Online impersonation is defined in the New York Code provisions that prohibit the practice, as the act of impersonating another "under an assumed character with intent to obtain a benefit or to injure or defraud another." The foremost case brought under this law, <i>People v. Golb</i>, in many ways epitomizes the bizarre and highly esoteric reasons why someone chooses to impersonate another in the first place.
Features
Recent Challenges To the FTC's Data Regulation Authority
Early on in 2015, pundits were already predicting that the extent and number of data breaches from 2014 would severely pale in comparison to those that would occur in 2015. Inevitably, people across the country, victims, media, members of government, and even litigious-minded attorneys, are scrambling to determine what legal recourse exists to not only retroactively seek retribution, but also proactively enforce data security methods ' a task that is still at its nascent stages of development.
Features
Can Cooperation Expose a Company to a Defamation Claim?
A criminal charge or civil enforcement action against a company can be devastating. Charges may, for example, lead to debarment from federal programs ' a corporate death sentence to health care companies and government contractors. But the DOJ, the SEC and other enforcement agencies have long touted the benefits of cooperation for companies under investigation.
Features
Measuring the ROI of Strong Information Governance Processes
Information governance requires a firm-wide approach for managing and protecting client information. By taking a proactive approach and laying out the business case through the measurement of the return on investment of information governance, law firms realize significant savings, improve client service and minimize risk.
Features
Imposing Liability Under DMCA Counter-Notification Provision
Although seemingly dry, the few cases heretofore that have confronted questions surrounding misrepresenting takedown notices have contained facts that are arguably ripped from the tabloids, including a bitter dispute between bloggers over the proper method of childbirth, and a kerfuffle arising from the wider publication of the views of a pro-straight pride organization in the U.K.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- Legal Possession: What Does It Mean?Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- The Right to Associate in the DefenseThe "right to associate" permits the insurer to work with the insured to investigate, defend, or settle a claim. Such partnerships protect the insurer and can prove beneficial to the insured's underlying case and ultimate exposure.Read More ›