Features
e-Discovery Docket Sheet
Recent court rulings in e-discovery.
Features
On the Case
In the legal realm, concern about the security of sensitive data during transport has never been higher. Attorneys from coast to coast have watched the headlines and read countless articles about files and tapes that have been lost or stolen while being moved from Point A to Point B ' during legal discovery activities, perhaps, or to satisfy compliance requirements.<br>As a result, law firms and corporate in-house counsel are investigating more dependable methods for securing information during transit, when it is most vulnerable. Many of these experienced denizens of e-data have concluded that encryption provides the greatest protection throughout the chain of custody, and that this locked-door method of data security can be achieved at a relatively reasonable cost.
Features
Prepare for e-Discovery
With state laws governing the capture and securing of evidence ' including electronic data ' the possibility of spoliation is a genuine concern. Not only could evidence subjected to spoliation be inadmissible, but misdemeanor or felony charges could apply to the collector and the contracting party.<br>Identifying electronic evidence, much like in a physical crime scene, starts with drawing increasing concentric circles around the victim or perpetrator. Some care must be taken regarding a company's policies and practices. State and federal law on personal property may be involved if the employee used personal devices legally or illegally in combination with the company's assets, and a warrant or commencement of discovery may be required to access personal property or equipment on private property.
Features
e-Mail Job Termination Notices
Traditionally, job-termination notices took the form of a pink slip of paper that employees found in their mailbox or in the envelope carrying their paycheck.<br>Recently, however, tech retailer Radio Shack used e-mails to give more than 400 employees notice of their involuntary separation from the firm. That move probably wasn't the use of technology many in the e-commerce, or the bricks-and-mortar, world envisioned for the business sector.
Features
Betting on Litigation
For all the publicity that our litigious society generates, the decision to sue or not, or even to send a so-called lawyer letter, is often agonizing for any business owners or principals.<br>This dilemma is particularly strong for the smaller firms that compose so much of the e-commerce sector. While the media often perceives lawyers as nothing more than 'ambulance chasers' constantly looking for personal injury lawsuits to stock their personal treasuries, most businesses should prefer to resolve disputes outside the courtroom.
Features
The Video Sites They Are A-Changing
The last few weeks have witnessed further evolution of the world of user-upload sites. MySpace.com and YouTube.com were once youthful rebels; their founders were young, their audience was predominantly under 30. These sites allowed youngsters to post their own video material. This, in turn, enraged copyright holders, because some of the postings used (and sometimes were in entirety) copyrighted material, taken without permission.
Features
Data Mining
The first part of this article discussed the importance and focus of data retrieval in matrimonial actions and the parameters of data mining. The conclusion herein addresses privacy concerns, the impact of e-mail, and the costs of data retrieval.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- Private Equity Valuation: A Significant DecisionInsiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity LitigationWhile the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.Read More ›
- What Does 2024 Hold for Cybersecurity?Our annual poll of experts on the trends and developments to watch out for in 2024 in AI, data privacy, cybersecurity, e-discovery and more.Read More ›