While evidence of adultery used to consist of lipstick smudges on the collar, credit-card receipts from motels and so forth, now it's far more likely to be in the form of text messages, e-mails, IMs or postings on online Web sites. Can these forms of evidence be discovered?
- March 30, 2010Stephen A. Zorn and Sophie Jacobi
As my firm's Technology Partner, I oversee the e-discovery process for most of the large cases at Severson & Werson. In 2008, one of our clients, a major national bank, was sued by its recently acquired mortgage lending company just after the subprime mortgage financing collapse. The case hinged upon the interpretation of a term in a contract related to the valuation of certain types of subprime loans in the securitization process.
March 29, 2010Bruce N. FurukawaDuring the fall of 2009, the Legal Technology Institute at the University of Florida Levin College of Law conducted an extensive nationwide survey of the legal profession regarding its use of case, matter and practice management system software.
March 29, 2010Andrew Z. Adkins IIIFirms of every size and in every geographic area must protect their electronic data and be prepared for potential IT disasters.
March 29, 2010Darryl d'AquinCutting-edge questions in the First Amendment arena have recently stemmed from clashes between students and school districts over the limits ' if any ' that may be imposed on speech posted on social networking sites like MySpace and Facebook. Now lawyers on both sides of the issue are urging the Third U.S. Circuit Court of Appeals to vacate two recent ' and seemingly conflicting ' decisions by two different three-judge panels, and to hold rearguments before the full court.
March 29, 2010Shannon P. DuffyThis article discusses the theory of active inducement in copyright law, the evolution of P2P technology over the past decade, recent U.S. and foreign legal decisions, and developments impacting copyright holders, file-sharing networks and Internet service providers.
March 29, 2010Richard Raysman and Peter BrownAs a marketer, know that if your employees post a blog comment, or an entry on Facebook or Twitter about your company or its products, a number of questions are raised. Is your company responsible for what is said?
March 29, 2010Barbara E. HoeyThere are a few judicial decisions indicating the likely issues on which a coverage dispute will focus when a claim for a data breach is made under a CGL policy.
March 29, 2010Joseph Geoghegan, Laurie A. Kamaiko and Dennis O. BrownLooking for information on a rival law firm? Trying to get some background on a prospective client? The Internet is full of useful resources that can meet your needs.
March 29, 2010Mark GedimanAs in-house counsel, if your employees post a blog comment, or an entry on Facebook or Twitter about your company or its products, a number of questions are raised. Is the company responsible?
March 29, 2010Barbara E. Hoey

