Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 3,892 results for "Internet Law & Strategy"...

Know When to Hold Them, Know When to Fold Them: Determining Whether the Equipment is Worth the Cost of Litigation
March 31, 2004
Is the equipment really worth the cost of litigation? Before advising clients to pursue problem accounts legally, it pays to determine the true market value of the equipment in question.
Ten Ways to Improve Medication Safety
March 31, 2004
The United States Pharmacopeia (USP), an organization that, among other things, operates MEDMARX, the national, Internet-accessible anonymous reporting database that hospitals and health care systems may voluntarily use to track and trend medication errors, last month published 10 recommendations for cutting down medication errors in hospitals and health care facilities.
A Sample of Effective <i>Voir Dire</i>
March 31, 2004
In Parts One and Two of this article, we discussed the strategies involved in deciding when to question the opposing party's expert; during preliminary <i>voir dire</i> or during cross examination. We noted that, in a jury trial, it is usually prudent to wait until cross-examination to attack the expert, so that the jury can see where the holes in the witness's qualifications and conclusions are. But sometimes, questioning during <i>voir dire</i> is preferable, especially when the result is likely to be the witness disqualification to testify as an expert.
Best Practices for E-Mail Filtering
March 30, 2004
Particularly during the past 2 years, the onerous task of filtering e-mail messages has grown to become a business and operational necessity - largely because of the influx of spam, as well as regulations and legislation that mandate the retention of e-communications such as e-mail and, increasingly, instant messages. Coupled with the traditional reasons for filtering ' malicious code attached to or embedded within the message, and inappropriate or sensitive message content ' filtering technologies and the market are undergoing radical change. This makes purchasing and implementation decisions difficult. Best practices for effective e-mail filtering can ease the decision-making process.
Practice Tip: <B>Protecting Against Digital Spies</b>
March 30, 2004
As the legal industry leverages IT to deliver enhanced services and improve overall business operations, Internet threats are increasing. According to the latest Symantec Internet Security Threat Report, one of the most significant threats today is malicious code that exposes confidential data such as passwords, decryption keys, keystrokes and more. Moreover, this malicious code is entering businesses from a widening array of sources. One of the most common delivery vehicles is spyware. According to security experts, millions of PCs in homes and businesses across the world are already infested with spyware. Yet, for all its ubiquity, it remains a relatively misunderstood threat.
The Era of Mega-Case Litigation
March 30, 2004
The era of mega-case litigation has arrived. In the last 2 years, mega-cases ' those with more than 500,000 pages for review ' have become commonplace according to leading law firms and litigation support vendors. Indeed, in high profile cases today, document collections can easily run over 50 million pages ' roughly a terabyte of data, or the equivalent of about 20,000 Banker boxes. The rapid growth of electronic documents presents significant challenges for corporations and law firms involved in litigation. Dealing with the challenges of document reviews across multiple, related cases is also becoming increasingly important for many corporations.
INNOVA: An Innovation in the Document Creation Process
March 30, 2004
Like it or not, in order to produce and collaborate on documents, the legal community is dependent on more and more software products which are increasingly sophisticated and interdependent. To maximize the financial investment in these products, it's optimal to leverage the integration opportunities that they offer. Firms have the option to take on custom development to achieve this goal, or to invest in a third-party product where the software vendor is responsible for keeping their product updated to integrate with new versions of other programs on the desktop. Innova, developed by SoftWise Corporation, is an example of a comprehensive, feature-rich, template program that standardizes and simplifies the document creation process. It integrates with a variety of contact management, document management and fax server programs typically found on a legal desktop.
Designing a Medical Device Surveillance Network
March 03, 2004
In last month's newsletter, we looked at some helpful Web sites for those who need to track the efficacy and safety of medical devices. Following are more useful Web sites for these purposes.
Digital Stealth Secrets and the Act
March 02, 2004
Corporate accountability (Section 302, 404 and 409 of SOA) has moved to priority status for most businesses. This article has as its core just one premise: understanding the risks associated with digital stealth fraud in the workplace, and what it can do to your company.
Audit Committee Members: the Act Affects You!
March 02, 2004
Last month, we discussed the provisions of the Sarbanes-Oxley Act (the Act) that directly affect audit committees. These included Title II: auditor indpendence.…

MOST POPULAR STORIES

  • Bankruptcy Sales: Finding a Diamond In the Rough
    There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
    Read More ›
  • The Right to Associate in the Defense
    The "right to associate" permits the insurer to work with the insured to investigate, defend, or settle a claim. Such partnerships protect the insurer and can prove beneficial to the insured's underlying case and ultimate exposure.
    Read More ›
  • DOJ's Cyber Fraud Initiative: A Wake-up Call That Keeps Ringing
    DOJ's Cyber Fraud Initiative has been a wake-up call for companies to prioritize cybersecurity and adhere to stringent standards. By leveraging the FCA, DOJ has used a powerful enforcement tool to target a wide range of cybersecurity failures and misrepresentations. The increasing focus on cybersecurity by enforcement agencies means that robust cybersecurity practices are becoming a standard expectation, not just a best practice.
    Read More ›