Features
PII: How New Technology Makes It Easier To Maintain Compliance
A study done at MIT found that 87% of the population in the U.S. could be uniquely identified by just three pieces of Personally identifiable information (PII): their five-digit zip code, gender and date of birth. This demonstrates that SSNs, while valuable, is not necessary to identify unique individuals.
Features
Constitutionality Of Facebook Threat Charges Challenged
A Pennsylvania man who was indicted for making violent threats on Facebook is now challenging the constitutionality of the federal cyberstalking statute, arguing that the law criminalizes "pure speech" and is vague and overbroad.
Features
A World of Copyright Confusion on the Web
Keeping track of and complying with copyright laws can be difficult, especially for ISPs and social-media companies that provide services to a global market. Many countries have developed specific legislation to help protect such entities from liability relating to the activities of their users. Unfortunately, the laws are not uniform ' or are not interpreted consistently ' and therefore compliance requires knowledge of the nuances among them.
Features
Worldox Takes Center Stage at Calfee with GX2 and Productivity Suite Upgrade
In early 2011, we began planning to move offices, prompting us to take stock of all our technology. We were running Windows XP and Office 2007 and could have stayed on Worldox GX, but GX2 included a feature called "Workspaces" which would help us supplement our author-based profiling system, thereby helping lawyers and staff to organize and find documents more readily. Thus, we began to build the case internally for upgrading to GX2.
Features
Increasing Speed and Confidence in Second Request Responses with New Technologies
Responding to Hart-Scott-Rodino Act Requests for Additional Information and Documentary Materials (more commonly known as "Second Requests") presents substantial challenges in assembling a comprehensive and complete production of requested information and documents from company archives.
Features
Five Ways You May Be Contributing to a Data Breach
While attorneys understand the importance of client confidentiality, many are less concerned about data security. This can be a serious oversight, since law firms are becoming increasingly vulnerable to security breaches. As other industries such as healthcare, financial services and the government start to recognize the dangers of security breaches and deploy more stringent security measures, the hacker community has begun to eye the legal industry as low-hanging fruit.
Features
Taking Responsibility for the e-Discovery Process
This article provides a checklist of best practices for both in-house and outside counsel to consider, discuss and monitor throughout the litigation to ensure confidence in the client relationship and the e-discovery process.
Features
Examining the Limits of Online Music Storage Provider Liability
Cloud storage is ideal for music. Music files are large enough to require substantial storage space, small enough to stream over relatively low bandwidth (such as a 3G wireless connection) and desirable to have available on mobile devices. Unsurprisingly, however, this business model brings with it various legal issues for the cloud storage provider.
Features
Blog Protection
Blogs, like traditional publications, may result in allegations of plagiarism, unauthorized use and defamation claims. And, as in the case of traditional publications, legal, technical and insurance options are available to reduce or eliminate blog-related difficulties for blog owners.
Features
e-Closings: When Convenience Creates Inconvenience ' and Complexity
Thanks to the Internet, e-closings (and traditional closings) have become quite streamlined. The most sophisticated deals are done in virtual deal rooms that allow multiple parties secure, controlled access to documents and procedures for signing the documents. But there is a definite negative impact.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Brave New World of Cybersecurity Due Diligence in Mergers and Acquisitions: Pitfalls and OpportunitiesLike poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Digital Dibs: Rival Views of Generative AI CopyrightsGAI platforms like ChatGPT and OpenAI often require very little human input, shattering this legal landscape's framework by posing a simple question: Who authored the material? We'll explore how two countries are answering this question in different ways.Read More ›
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›