Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


Ideal Case Management Implementation
March 28, 2006
Legal case management software is a valuable tool that law firms use to efficiently manage legal cases. However, while the application provides attorneys with a convenient method of effectively managing client and case information, there is a clear disconnect in many law firms that occurs at the point of implementation.
Defining Success When It Comes To Legal Technology Training Programs
March 28, 2006
Software trainers find the need for computer training to be never-ending. In many firms, training programs abound but users don't seem to be gaining ground fast enough to master the array of applications on the desktop. Frustrations among users rise with the need for speed in productivity and also for trainers as they fight for training time, training resources, and willing participants. Yes ' willing participants. End-users aren't motivated to attend training that is stressful,discouraging, or a waste of time; often defined as any training experience that does not provide skill retention and mastery.
Electronic Discovery Year in Review: Where We've Been, Where We are Going
March 28, 2006
Last year was explosive for the electronic discovery industry. From enormous jury verdicts to proposed changes in the federal rules, the legal and business landscape for e-discovery has never been more in flux. While more e-discovery vendors have entered the market this year, mergers have also consolidated the industry like never before. Meanwhile, case law continues to grow to include not just the very well publicized sanctions cases, but also opinions that have honed in on some of the technical challenges of e-discovery.
CD: Send Me a Proposal - Winning the RFP
March 24, 2006
Law firms devote tremendous resources toward lead generation, then fall short when investing the time necessary to develop their firm's strategy and winning solution to make leap from prospect to contract.
March issue in PDF format
March 21, 2006
…
Lawmakers Propose to Put Cell Phone Records Off-Limits
March 21, 2006
Selling or obtaining another person's cell phone records would become a crime in Georgia under a proposal that is moving through the Georgia Legislature. Cell phone records are being sold over the Internet, with attorneys among the top customers, according to some reports.
The Expanding Scope of Corporate Information Security Obligations
March 21, 2006
Protecting the security of corporate information and computer systems is becoming a major legal requirement for businesses. Driven by several recent highly publicized security breaches involving personal information, strong pressures are building for enhanced corporate obligations to implement appropriate information security measures to protect personal data and the people it describes.
USA PATRIOT Act Impasse: E-mail Interception Rules Need Congressional Attention, Too
March 21, 2006
When, if ever, can your Internet Service Provider ('ISP') legally intercept and then read your e-mail? Nearly anytime, according to almost every federal court that has tackled the issue. Due to outdated statutory language, courts have been inconsistent and tentative in applying the federal Wiretap Act to e-mail interception. In recent years, two circuits have flip-flopped on this crucial issue.
Implementing Best Practices Before and After a Security Breach Can Mitigate Corporate Risk
March 20, 2006
Victims of personal data security breaches are showing their displeasure by terminating relationships with the companies that maintained their data. A 'National Survey on Data Security Breach Notification,' released Sept. 26, 2005 by privacy think tank Ponemon Institute and sponsored by White & Case, indicates that 19% of Americans who have received notification that their personal data had been compromised due to a breach have terminated or plan to terminate their relationship with the company where the security breach occurred. Another 40% say that they are considering whether to take their business elsewhere as a result of the breach, and a whopping 58% say that the incident has decreased their trust and confidence in the company. Percentages set forth in this article are based on the total number of survey respondents who reported receiving a breach notification.
Free Updates
March 16, 2006
Here's the story.<a href="http://www.ljnonline.com/pub/ljn_matrimonial/24_3/news/146180-1.html">Story 1</a>

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›