Features
PII: How New Technology Makes It Easier To Maintain Compliance
A study done at MIT found that 87% of the population in the U.S. could be uniquely identified by just three pieces of Personally identifiable information (PII): their five-digit zip code, gender and date of birth. This demonstrates that SSNs, while valuable, is not necessary to identify unique individuals.
Features
Constitutionality Of Facebook Threat Charges Challenged
A Pennsylvania man who was indicted for making violent threats on Facebook is now challenging the constitutionality of the federal cyberstalking statute, arguing that the law criminalizes "pure speech" and is vague and overbroad.
Features
A World of Copyright Confusion on the Web
Keeping track of and complying with copyright laws can be difficult, especially for ISPs and social-media companies that provide services to a global market. Many countries have developed specific legislation to help protect such entities from liability relating to the activities of their users. Unfortunately, the laws are not uniform ' or are not interpreted consistently ' and therefore compliance requires knowledge of the nuances among them.
Features
Worldox Takes Center Stage at Calfee with GX2 and Productivity Suite Upgrade
In early 2011, we began planning to move offices, prompting us to take stock of all our technology. We were running Windows XP and Office 2007 and could have stayed on Worldox GX, but GX2 included a feature called "Workspaces" which would help us supplement our author-based profiling system, thereby helping lawyers and staff to organize and find documents more readily. Thus, we began to build the case internally for upgrading to GX2.
Features
Increasing Speed and Confidence in Second Request Responses with New Technologies
Responding to Hart-Scott-Rodino Act Requests for Additional Information and Documentary Materials (more commonly known as "Second Requests") presents substantial challenges in assembling a comprehensive and complete production of requested information and documents from company archives.
Features
Five Ways You May Be Contributing to a Data Breach
While attorneys understand the importance of client confidentiality, many are less concerned about data security. This can be a serious oversight, since law firms are becoming increasingly vulnerable to security breaches. As other industries such as healthcare, financial services and the government start to recognize the dangers of security breaches and deploy more stringent security measures, the hacker community has begun to eye the legal industry as low-hanging fruit.
Features
Taking Responsibility for the e-Discovery Process
This article provides a checklist of best practices for both in-house and outside counsel to consider, discuss and monitor throughout the litigation to ensure confidence in the client relationship and the e-discovery process.
Features
Examining the Limits of Online Music Storage Provider Liability
Cloud storage is ideal for music. Music files are large enough to require substantial storage space, small enough to stream over relatively low bandwidth (such as a 3G wireless connection) and desirable to have available on mobile devices. Unsurprisingly, however, this business model brings with it various legal issues for the cloud storage provider.
Features
Blog Protection
Blogs, like traditional publications, may result in allegations of plagiarism, unauthorized use and defamation claims. And, as in the case of traditional publications, legal, technical and insurance options are available to reduce or eliminate blog-related difficulties for blog owners.
Features
e-Closings: When Convenience Creates Inconvenience ' and Complexity
Thanks to the Internet, e-closings (and traditional closings) have become quite streamlined. The most sophisticated deals are done in virtual deal rooms that allow multiple parties secure, controlled access to documents and procedures for signing the documents. But there is a definite negative impact.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Credible Fraudulent Transfer AdvocacyAppellate courts continue to use common sense when disposing of constructively fraudulent transfer appeals, as recent decisions show.Read More ›
- ELFA ScheduleThe Equipment Leasing and Finance Association has released its 2016 calendar of events.Read More ›
- Holders of Unredeemed Gift Cards Denied Bankpruptcy PriorityFor some time now, the brick and mortar side of the retail industry has been in financial distress. In 2015 and 2016 alone, brand-name companies such as Sports Authority, RadioShack, Aéropostale, American Apparel, Eastern Mountain Sports and City Sports sought bankruptcy protection. A common question in these cases is how to treat holders of unredeemed gift cards. Are they near the back of the line with other general unsecured creditors, or are they entitled to “priority” payment status under the Bankruptcy Code?Read More ›
- Law Firms are Reducing Redundant Real Estate by Bringing Support Services Back to the OfficeA trend analysis of the benefits and challenges of bringing back administrative, word processing and billing services to law offices.Read More ›
- The 'Friendly Fraud' ChargebackThe abuse of the chargeback option has resulted in a "friendly fraud" epidemic harming not only merchants, but the very consumers the programs were designed to help.Read More ›