Features
Six MetricsThat Matter in Evaluating e-Discovery
Analysis of the e-discovery process before it begins can make a project more efficient and cost-effective, but often, lawyers and document reviewers dive right in without a plan.
Features
Sensitive Data Loss is Not Inevitable
Global banking institutions are increasingly pressing outside law firms to demonstrate they are employing top-tier technologies to defend against cyber hackers. In some cases, firms are being asked to fill out 60-page questionnaires detailing their cybersecurity measures in minute detail, while others must consent to on-site inspections.
Features
The Ethical Duty to Be Competent in Technology and e-Discovery
Lawyers understand that they have an ethical duty to remain competent in the law and its practice. But far fewer are aware that an emerging body of legal-ethics rules and opinions say that lawyers also have a duty to be competent in relevant technology. And e-discovery, an area of law practice many lawyers still consider a niche, is quickly becoming more relevant to every type of litigation.
Features
Treatment of Social Media Accounts In Bankruptcy
In today's digital marketplace, understanding how the law applies to virtual assets is becoming as important as understanding how it applies to the brick-and-mortar world. Despite the importance of the Internet to commerce, however, it is still unclear how important provisions of bankruptcy law apply to certain virtual assets.
Features
Digital Ubiquity and the Fourth Amendment
Pick up pretty much any 21st century smart phone, tablet or PC, and in minutes, a treasure trove of information about its owner can be uncovered. Missives to a significant other, photos from summer vacation, browsing history that spans years; all of this information, generally considered of the most intimate nature, is easily accessible with even a rudimentary technical knowledge of the device's operating system. Needless to say, unwanted disclosure of such information can be highly damaging.
Features
Apple's iPhone User Interface Held Functional for Trade Dress Infringement, But Not Design Patent Purposes
In the long-running <i>Apple v. Samsung</i> dispute, the Federal Circuit has highlighted a marked difference between the effectiveness of trade dress and design patents in protecting the visual characteristics of a product, which could potentially cost Apple hundreds of millions of dollars in lost damages.
Features
Derivative Cyber Litigation
Potential liability for data breaches has emerged as a major concern for businesses in the past few years as massive cyber-attacks are increasing, with companies that use or store private customer data electronically or use social media as part of their marketing strategy being the prime targets. These data breaches have contributed to an increase in director and officer (D&O) litigation in connection with cyber incidents, and will continue to do so.
Features
Building a Vendor Management Program
For law departments, today's business environment is making it increasingly difficult to manage, control or reduce costs while being able to achieve satisfactory results. This is forcing companies to become more efficient in managing and controlling legal costs handled both internally by the organization and externally by outside counsel.
Features
Data Sharing in the Cloud
The practical and economic advantages of cloud computing are clear ' it eliminates the need to send client data via traditional, costly methods, and is significantly less expensive than building and maintaining the same data storage capacity in-house. But is the attorney-client privilege at risk?
Features
Goulston & Storrs Embraces Template Management
The firm is always looking to improve service delivery, and in 2014, we were struggling with a template management solution that was falling far short of what the firm wanted. Our mission was straightforward: find a template application that the firm could manage and freely use on its own without external help and that meets the latest technology and software versions.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›