Features
Tools and Techniques for Defensibly Processing Electronic Data
Pursuant to the Federal Rules of Civil Procedure, if the parties to litigation fail to take reasonable steps to assure that relevant, non-privileged data is produced to opposing parties in response to discovery requests, courts may impose sanctions and may instruct juries to draw an adverse inference. Consequently, parties to litigation must take special care to adhere to defensible standards and practices when processing electronic data, especially since the overwhelming majority of information generated by…
Features
<b><i>BREAKING NEWS:</i> </b><b>Hewlett-Packard Claims Autonomy Cooked Books</b>
Hewlett-Packard Co. said on Nov. 20 that it will take an $8.8 billion write down related to its purchase of Autonomy PLC and alleged that Autonomy executives committed accounting fraud to inflate the company's value during the sale.
Features
An Analysis of Proposed Federal Cybersecurity Legislation
Michael Chertoff, the former head of the U.S. Department of Homeland Security (DHS), recently remarked that "cyber threats represent one of the most seriously disruptive challenges to national security since the onset of the nuclear age 60 years ago."
Features
No Injunction In Video-on-Demand Litigation
The digital content era has moved patent issues to the forefront for the entertainment industry. In one recent case, even after winning a patent infringement case, a video-on-demand company still may not get an injunction prohibiting ongoing infringement by defendant Verizon Communications.
Features
Pinning Your Company's Hopes on Pinterest
Heralded as the next big thing in social media, Pinterest presents new legal risks for companies engaged in social media marketing. By sharing images and encouraging others to re-pin them, Pinterest users may inadvertently engage in copyright or trademark infringement, violate licensing agreements, or run afoul of FTC rules for commercial endorsements.
Features
The Future in Law Firm Technology
As technology has evolved and we've gone from proprietary systems to open ones with standard data types, access to data is much easier. In fact, today's challenge is not accessing information, it's deciding what to access and what to do with it.
Features
Social Document Management Systems: A Thing of the Present
What is a social document management system? Social DMS is based off the 100% Web concept. This concept envisions that all firm processes, workflows and interactions are accessed and deployed through a 100% Web-based approach. Why? It is the future and reflects how the Web is organized and how consumer culture is organized.
Features
Microsoft Word 2010 Tips and Tricks
If you're moving from Microsoft Word 2007 to 2010, you won't have quite the initial shock as if you're upgrading from Microsoft Word 2003 or lower. The interface is vastly different. The biggest change you'll see is that Microsoft is now using Ribbon Tabs rather than drop down menu items: keeping your workspace clear while looking for specific features.
Features
<i>FTC v. Google</i>: Lessons Learned
Twice in less than 12 months, the FTC has investigated Google Inc.'s personal data-handling practices to compare them with Google's representations made in its website privacy policy and other documents. And twice in less than 12 months, the FTC has determined that Google's practices constituted misrepresentation.
Features
No Vote Yet on National Net Sales Tax Collection Bill
Congress adjourned Sept. 21 without further action on a House bill that would require remote sellers to collect and pay sales and use taxes on purchases made by residents of states in which the sellers have no physical presence ' after the states implement a simplified collection and payment system.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- Private Equity Valuation: A Significant DecisionInsiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity LitigationWhile the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.Read More ›
- What Does 2024 Hold for Cybersecurity?Our annual poll of experts on the trends and developments to watch out for in 2024 in AI, data privacy, cybersecurity, e-discovery and more.Read More ›