Features
Crowdsourcing the Law
The Internet's completely over, the musician once-again known as Prince declared this summer. If so, I am at a loss to explain the ongoing emergence of innovative Web sites such as Spindle Law, a new site that is reconfiguring the traditional legal treatise to make it better fit a "Web 2.0" world.
Features
Oh, Data, Where Art Thou?
The ability to convert capital expenditures to operating expenses, tax considerations and other cost-savings benefits are sending businesses to the cloud with glee, while the legal profession is lagging behind but getting the hint. As the evolution of security measures becomes more imperative, tales of international disagreement regarding security regulation make the location of a vendor's servers a question of paramount importance in selecting a cloud provider. For lawyers, this question of location is compounded by jurisdictional considerations.
Features
The Brave New World Of e-Workplace Privacy Policies
Part One of this article, last month, examined the liability involved with social media and e-mail use. Part Two discusses implementing compliant and defensible workplace policies.
Features
Crowdsourcing the Law
The Internet's completely over, the musician once-again known as Prince declared this summer. If so, I am at a loss to explain the ongoing emergence of innovative Web sites such as Spindle Law, a new site that is reconfiguring the traditional legal treatise to make it better fit a "Web 2.0" world.
Features
Navigating the Changing Technological Landscape
In <i>City of Ontario v. Quon</i>, the U.S. Supreme Court held that a government employer's search of an employee's communications on an employer-issued pager was reasonable under the circumstances and, therefore, did not violate the Fourth Amendment of the Constitution. The Court's narrowly tailored decision underscores that cases in the area of employee privacy will continue to be highly fact-sensitive.
Features
e-Discovery Revisited
This article presents some historical context illustrating the early development of e-discovery jurisprudence, continues with a discussion of the influential Sedona Conference and the findings of the Advisory Committee on the federal rules, analyzes the most recent case law, and outlines a prudent approach to e-discovery.
Features
Using Technology Can Overcome First Amendment e-Monitoring Worries
e-Commerce tools allow e-monitoring of an Internet user's actions ' but the desire of companies and others to know and to track what an Internet user does on the Internet isn't as simple an issue as just setting up the technology and being done with it.
Features
Unconstitutional Burdens
Record-breaking budget shortfalls have caused states to search outside the box for revenue-raising tools that many argue are unconstitutional and violate the consumer privacy that online shoppers have come to expect. Today, with so much of retail activity conducted over the Internet, states are struggling with revenue losses stemming from this constitutional restriction. States are reacting by becoming ever more creative in their attempts to capture this lost revenue by adopting new laws aimed at circumventing the Commerce Clause restrictions.
Features
<b><i>Product Review:</b></i> American LegalNet's eDockets
The docketing process can be highly risky. When a law firm's docketing and calendar workflow is undefined or loosely structured, the firm is left vulnerable ' vulnerable to missing deadlines, losing track of e-filings, or submitting out-of-date or unofficial forms. Further, time-consuming paper reporting, inconsistent database and deadline management and a lack of integration with other critical programs (such as time and billing systems, conflicts checking and document management systems) cannot only diminish a firm's workflow efficiency, but also increase its risk.
Features
How Technology Can Drive Effective Case Collaboration
Reviewing depositions and documents faster and more efficiently is critical for law firms in the face of increasingly complex and arduous litigation processes. While many firms are already using collaboration tools to promote and facilitate ongoing interaction across legal teams, it has also introduced new challenges. Predominant among them: How can legal teams and counsel leverage technology to collaborate and more efficiently manage case administration and trial preparation while keeping costs at a minimum?
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Enhanced Oversight of Search Warrants and Title III WiretapsSearch warrants and wiretaps were once used primarily to investigate organized crime, drug dealing and terrorism. In recent years, however, prosecutors have employed these tools increasingly in the context of white-collar crime to the point where it is now commonplace.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The Right to Associate in the DefenseThe "right to associate" permits the insurer to work with the insured to investigate, defend, or settle a claim. Such partnerships protect the insurer and can prove beneficial to the insured's underlying case and ultimate exposure.Read More ›
- DOJ's Cyber Fraud Initiative: A Wake-up Call That Keeps RingingDOJ's Cyber Fraud Initiative has been a wake-up call for companies to prioritize cybersecurity and adhere to stringent standards. By leveraging the FCA, DOJ has used a powerful enforcement tool to target a wide range of cybersecurity failures and misrepresentations. The increasing focus on cybersecurity by enforcement agencies means that robust cybersecurity practices are becoming a standard expectation, not just a best practice.Read More ›