Features
The Paper-to-Digital Law Firm
Even though the costs and inefficiencies of paper records are an obvious strain on the law firm business model, law firms struggle with less-paper initiatives for one key reason: according to ILTA members informally surveyed in over 20 cities domestically, about half of today's attorneys would still prefer to work with paper, even if the entire file is digitally available from the DMS.
Features
Analyzing Advertiser Liability for Blogger Reviews
This holiday shopping season, millions of Americans will look to their social media friends or favorite bloggers for advice when deciding which gifts to buy. And with over 42 million blog sites in the United States alone, there are plenty of "peer" opinions to consider. But are consumer-generated product-related reviews or commentary always the mere opinion of the person posting them, as many readers may believe?
Features
Proactive Information Governance
Information governance (IG) is how organizations tackle growing data volumes ' identifying what's important, what isn't, and what to do with it all.
Features
The Brave New World Of Internet Copyright Trolls
Copyright trolls are in the business of acquiring the right to bring lawsuits against alleged infringers and threatening to file copyright infringement claims in order to induce rapid settlements against large groups of defendants.
Features
Rocket Matter Case Study
Each system reviewed had features that raised the interest of at least one of our testers. Overall though, the most effective criteria we applied was: "Does it work for us?" Did the product function as promised and fit with the way our users envisioned themselves using the system? And I must emphasize the word envisioned because this move was such a departure for some that it was unlike anything they had experienced before. Ultimately, we determined that system to be Rocket Matter.
Features
Law Firm Security Pressures Alleviated With Financial Strategies
We know the consumer-industry stories of hackers infiltrating Target and, more recently, Home Depot. Law firms are now at the center of the storm because they store some of their clients' most sensitive business information and are viewed by criminal elements as a less-defended path to that data. Firms must take care to understand and respond to evolving security trends with response strategies.
Features
Digital Signatures In the Legal Market
Automated signing solutions are all around us: at the supermarket checkout; when we receive a package; at the doctor's office. Despite this, paper-based signing still finds its way into our regular operations, and too often remains there unquestioned.
Features
The Copyright Office's Revised Compendium's Views on Digital Content, Copyrightability
Much has been written about the so-called "monkey selfie" and the dispute about whether nature photographer David Slater owns a photo snapped by a macaque monkey. As entertaining as that story is, there are more practical and far-reaching consequences that arise out the Copyright Office's overhaul of its standards and practices. This is especially true for the type of digital and Internet-based businesses and technologies that operate on the entertainment industry landscape.
Features
Don't Be Afraid of Cybersecurity Information Sharing
Recent government action has shown that the White House and Congress are keenly aware of the potential data security benefits of robust information sharing between and among the private sector and the government. In recent years, information sharing bills have been introduced regularly in both the Senate and the House in an effort to encourage the flow of cyberthreat data between the private sector and the government.
Features
Word 2013: Better by Design
Word possesses all the ingredients needed to make a much more positive first impression. It just takes a little time, planning and finesse to go from 'blah to bling!'
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- The Anti-Assignment Override ProvisionsUCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›