Features
PII: How New Technology Makes It Easier To Maintain Compliance
A study done at MIT found that 87% of the population in the U.S. could be uniquely identified by just three pieces of Personally identifiable information (PII): their five-digit zip code, gender and date of birth. This demonstrates that SSNs, while valuable, is not necessary to identify unique individuals.
Features
Constitutionality Of Facebook Threat Charges Challenged
A Pennsylvania man who was indicted for making violent threats on Facebook is now challenging the constitutionality of the federal cyberstalking statute, arguing that the law criminalizes "pure speech" and is vague and overbroad.
Features
A World of Copyright Confusion on the Web
Keeping track of and complying with copyright laws can be difficult, especially for ISPs and social-media companies that provide services to a global market. Many countries have developed specific legislation to help protect such entities from liability relating to the activities of their users. Unfortunately, the laws are not uniform ' or are not interpreted consistently ' and therefore compliance requires knowledge of the nuances among them.
Features
Worldox Takes Center Stage at Calfee with GX2 and Productivity Suite Upgrade
In early 2011, we began planning to move offices, prompting us to take stock of all our technology. We were running Windows XP and Office 2007 and could have stayed on Worldox GX, but GX2 included a feature called "Workspaces" which would help us supplement our author-based profiling system, thereby helping lawyers and staff to organize and find documents more readily. Thus, we began to build the case internally for upgrading to GX2.
Features
Increasing Speed and Confidence in Second Request Responses with New Technologies
Responding to Hart-Scott-Rodino Act Requests for Additional Information and Documentary Materials (more commonly known as "Second Requests") presents substantial challenges in assembling a comprehensive and complete production of requested information and documents from company archives.
Features
Five Ways You May Be Contributing to a Data Breach
While attorneys understand the importance of client confidentiality, many are less concerned about data security. This can be a serious oversight, since law firms are becoming increasingly vulnerable to security breaches. As other industries such as healthcare, financial services and the government start to recognize the dangers of security breaches and deploy more stringent security measures, the hacker community has begun to eye the legal industry as low-hanging fruit.
Features
Taking Responsibility for the e-Discovery Process
This article provides a checklist of best practices for both in-house and outside counsel to consider, discuss and monitor throughout the litigation to ensure confidence in the client relationship and the e-discovery process.
Features
Examining the Limits of Online Music Storage Provider Liability
Cloud storage is ideal for music. Music files are large enough to require substantial storage space, small enough to stream over relatively low bandwidth (such as a 3G wireless connection) and desirable to have available on mobile devices. Unsurprisingly, however, this business model brings with it various legal issues for the cloud storage provider.
Features
Blog Protection
Blogs, like traditional publications, may result in allegations of plagiarism, unauthorized use and defamation claims. And, as in the case of traditional publications, legal, technical and insurance options are available to reduce or eliminate blog-related difficulties for blog owners.
Features
e-Closings: When Convenience Creates Inconvenience ' and Complexity
Thanks to the Internet, e-closings (and traditional closings) have become quite streamlined. The most sophisticated deals are done in virtual deal rooms that allow multiple parties secure, controlled access to documents and procedures for signing the documents. But there is a definite negative impact.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Enhanced Oversight of Search Warrants and Title III WiretapsSearch warrants and wiretaps were once used primarily to investigate organized crime, drug dealing and terrorism. In recent years, however, prosecutors have employed these tools increasingly in the context of white-collar crime to the point where it is now commonplace.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The Right to Associate in the DefenseThe "right to associate" permits the insurer to work with the insured to investigate, defend, or settle a claim. Such partnerships protect the insurer and can prove beneficial to the insured's underlying case and ultimate exposure.Read More ›
- DOJ's Cyber Fraud Initiative: A Wake-up Call That Keeps RingingDOJ's Cyber Fraud Initiative has been a wake-up call for companies to prioritize cybersecurity and adhere to stringent standards. By leveraging the FCA, DOJ has used a powerful enforcement tool to target a wide range of cybersecurity failures and misrepresentations. The increasing focus on cybersecurity by enforcement agencies means that robust cybersecurity practices are becoming a standard expectation, not just a best practice.Read More ›