Features
Tools and Techniques for Defensibly Processing Electronic Data
Pursuant to the Federal Rules of Civil Procedure, if the parties to litigation fail to take reasonable steps to assure that relevant, non-privileged data is produced to opposing parties in response to discovery requests, courts may impose sanctions and may instruct juries to draw an adverse inference. Consequently, parties to litigation must take special care to adhere to defensible standards and practices when processing electronic data, especially since the overwhelming majority of information generated by…
Features
<b><i>BREAKING NEWS:</i> </b><b>Hewlett-Packard Claims Autonomy Cooked Books</b>
Hewlett-Packard Co. said on Nov. 20 that it will take an $8.8 billion write down related to its purchase of Autonomy PLC and alleged that Autonomy executives committed accounting fraud to inflate the company's value during the sale.
Features
An Analysis of Proposed Federal Cybersecurity Legislation
Michael Chertoff, the former head of the U.S. Department of Homeland Security (DHS), recently remarked that "cyber threats represent one of the most seriously disruptive challenges to national security since the onset of the nuclear age 60 years ago."
Features
No Injunction In Video-on-Demand Litigation
The digital content era has moved patent issues to the forefront for the entertainment industry. In one recent case, even after winning a patent infringement case, a video-on-demand company still may not get an injunction prohibiting ongoing infringement by defendant Verizon Communications.
Features
Pinning Your Company's Hopes on Pinterest
Heralded as the next big thing in social media, Pinterest presents new legal risks for companies engaged in social media marketing. By sharing images and encouraging others to re-pin them, Pinterest users may inadvertently engage in copyright or trademark infringement, violate licensing agreements, or run afoul of FTC rules for commercial endorsements.
Features
The Future in Law Firm Technology
As technology has evolved and we've gone from proprietary systems to open ones with standard data types, access to data is much easier. In fact, today's challenge is not accessing information, it's deciding what to access and what to do with it.
Features
Social Document Management Systems: A Thing of the Present
What is a social document management system? Social DMS is based off the 100% Web concept. This concept envisions that all firm processes, workflows and interactions are accessed and deployed through a 100% Web-based approach. Why? It is the future and reflects how the Web is organized and how consumer culture is organized.
Features
Microsoft Word 2010 Tips and Tricks
If you're moving from Microsoft Word 2007 to 2010, you won't have quite the initial shock as if you're upgrading from Microsoft Word 2003 or lower. The interface is vastly different. The biggest change you'll see is that Microsoft is now using Ribbon Tabs rather than drop down menu items: keeping your workspace clear while looking for specific features.
Features
<i>FTC v. Google</i>: Lessons Learned
Twice in less than 12 months, the FTC has investigated Google Inc.'s personal data-handling practices to compare them with Google's representations made in its website privacy policy and other documents. And twice in less than 12 months, the FTC has determined that Google's practices constituted misrepresentation.
Features
No Vote Yet on National Net Sales Tax Collection Bill
Congress adjourned Sept. 21 without further action on a House bill that would require remote sellers to collect and pay sales and use taxes on purchases made by residents of states in which the sellers have no physical presence ' after the states implement a simplified collection and payment system.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- The Brave New World of Cybersecurity Due Diligence in Mergers and Acquisitions: Pitfalls and OpportunitiesLike poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.Read More ›
- The 'Sophisticated Insured' DefenseA majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- The New York Uniform Commercial Code Comes of AgeParties in large non-consumer transactions with no connection whatsoever to New York often choose its law to govern their transactions, and New York statutes permit them to do so. What most people do not know is that the New York Uniform Commercial Code is outdated.Read More ›