Features
PII: How New Technology Makes It Easier To Maintain Compliance
A study done at MIT found that 87% of the population in the U.S. could be uniquely identified by just three pieces of Personally identifiable information (PII): their five-digit zip code, gender and date of birth. This demonstrates that SSNs, while valuable, is not necessary to identify unique individuals.
Features
Constitutionality Of Facebook Threat Charges Challenged
A Pennsylvania man who was indicted for making violent threats on Facebook is now challenging the constitutionality of the federal cyberstalking statute, arguing that the law criminalizes "pure speech" and is vague and overbroad.
Features
A World of Copyright Confusion on the Web
Keeping track of and complying with copyright laws can be difficult, especially for ISPs and social-media companies that provide services to a global market. Many countries have developed specific legislation to help protect such entities from liability relating to the activities of their users. Unfortunately, the laws are not uniform ' or are not interpreted consistently ' and therefore compliance requires knowledge of the nuances among them.
Features
Worldox Takes Center Stage at Calfee with GX2 and Productivity Suite Upgrade
In early 2011, we began planning to move offices, prompting us to take stock of all our technology. We were running Windows XP and Office 2007 and could have stayed on Worldox GX, but GX2 included a feature called "Workspaces" which would help us supplement our author-based profiling system, thereby helping lawyers and staff to organize and find documents more readily. Thus, we began to build the case internally for upgrading to GX2.
Features
Increasing Speed and Confidence in Second Request Responses with New Technologies
Responding to Hart-Scott-Rodino Act Requests for Additional Information and Documentary Materials (more commonly known as "Second Requests") presents substantial challenges in assembling a comprehensive and complete production of requested information and documents from company archives.
Features
Five Ways You May Be Contributing to a Data Breach
While attorneys understand the importance of client confidentiality, many are less concerned about data security. This can be a serious oversight, since law firms are becoming increasingly vulnerable to security breaches. As other industries such as healthcare, financial services and the government start to recognize the dangers of security breaches and deploy more stringent security measures, the hacker community has begun to eye the legal industry as low-hanging fruit.
Features
Taking Responsibility for the e-Discovery Process
This article provides a checklist of best practices for both in-house and outside counsel to consider, discuss and monitor throughout the litigation to ensure confidence in the client relationship and the e-discovery process.
Features
Examining the Limits of Online Music Storage Provider Liability
Cloud storage is ideal for music. Music files are large enough to require substantial storage space, small enough to stream over relatively low bandwidth (such as a 3G wireless connection) and desirable to have available on mobile devices. Unsurprisingly, however, this business model brings with it various legal issues for the cloud storage provider.
Features
Blog Protection
Blogs, like traditional publications, may result in allegations of plagiarism, unauthorized use and defamation claims. And, as in the case of traditional publications, legal, technical and insurance options are available to reduce or eliminate blog-related difficulties for blog owners.
Features
e-Closings: When Convenience Creates Inconvenience ' and Complexity
Thanks to the Internet, e-closings (and traditional closings) have become quite streamlined. The most sophisticated deals are done in virtual deal rooms that allow multiple parties secure, controlled access to documents and procedures for signing the documents. But there is a definite negative impact.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- "Holy Fair Use, Batman": Copyright, Fair Use and the Dark KnightThe copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.Read More ›
- Legal Possession: What Does It Mean?Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›