Features
Tools and Techniques for Defensibly Processing Electronic Data
Pursuant to the Federal Rules of Civil Procedure, if the parties to litigation fail to take reasonable steps to assure that relevant, non-privileged data is produced to opposing parties in response to discovery requests, courts may impose sanctions and may instruct juries to draw an adverse inference. Consequently, parties to litigation must take special care to adhere to defensible standards and practices when processing electronic data, especially since the overwhelming majority of information generated by…
Features
<b><i>BREAKING NEWS:</i> </b><b>Hewlett-Packard Claims Autonomy Cooked Books</b>
Hewlett-Packard Co. said on Nov. 20 that it will take an $8.8 billion write down related to its purchase of Autonomy PLC and alleged that Autonomy executives committed accounting fraud to inflate the company's value during the sale.
Features
An Analysis of Proposed Federal Cybersecurity Legislation
Michael Chertoff, the former head of the U.S. Department of Homeland Security (DHS), recently remarked that "cyber threats represent one of the most seriously disruptive challenges to national security since the onset of the nuclear age 60 years ago."
Features
No Injunction In Video-on-Demand Litigation
The digital content era has moved patent issues to the forefront for the entertainment industry. In one recent case, even after winning a patent infringement case, a video-on-demand company still may not get an injunction prohibiting ongoing infringement by defendant Verizon Communications.
Features
Pinning Your Company's Hopes on Pinterest
Heralded as the next big thing in social media, Pinterest presents new legal risks for companies engaged in social media marketing. By sharing images and encouraging others to re-pin them, Pinterest users may inadvertently engage in copyright or trademark infringement, violate licensing agreements, or run afoul of FTC rules for commercial endorsements.
Features
The Future in Law Firm Technology
As technology has evolved and we've gone from proprietary systems to open ones with standard data types, access to data is much easier. In fact, today's challenge is not accessing information, it's deciding what to access and what to do with it.
Features
Social Document Management Systems: A Thing of the Present
What is a social document management system? Social DMS is based off the 100% Web concept. This concept envisions that all firm processes, workflows and interactions are accessed and deployed through a 100% Web-based approach. Why? It is the future and reflects how the Web is organized and how consumer culture is organized.
Features
Microsoft Word 2010 Tips and Tricks
If you're moving from Microsoft Word 2007 to 2010, you won't have quite the initial shock as if you're upgrading from Microsoft Word 2003 or lower. The interface is vastly different. The biggest change you'll see is that Microsoft is now using Ribbon Tabs rather than drop down menu items: keeping your workspace clear while looking for specific features.
Features
<i>FTC v. Google</i>: Lessons Learned
Twice in less than 12 months, the FTC has investigated Google Inc.'s personal data-handling practices to compare them with Google's representations made in its website privacy policy and other documents. And twice in less than 12 months, the FTC has determined that Google's practices constituted misrepresentation.
Features
No Vote Yet on National Net Sales Tax Collection Bill
Congress adjourned Sept. 21 without further action on a House bill that would require remote sellers to collect and pay sales and use taxes on purchases made by residents of states in which the sellers have no physical presence ' after the states implement a simplified collection and payment system.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- The Anti-Assignment Override ProvisionsUCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›