Features
Modern Evidence in Matrimonial Proceedings
While evidence of adultery used to consist of lipstick smudges on the collar, credit-card receipts from motels and so forth, now it's far more likely to be in the form of text messages, e-mails, IMs or postings on online Web sites. Can these forms of evidence be discovered?
Features
Containing Costs with Concept Searching Saves Clients Thousands
As my firm's Technology Partner, I oversee the e-discovery process for most of the large cases at Severson & Werson. In 2008, one of our clients, a major national bank, was sued by its recently acquired mortgage lending company just after the subprime mortgage financing collapse. The case hinged upon the interpretation of a term in a contract related to the valuation of certain types of subprime loans in the securitization process.
Features
CMS Adoption Rate Should Be Higher
During the fall of 2009, the Legal Technology Institute at the University of Florida Levin College of Law conducted an extensive nationwide survey of the legal profession regarding its use of case, matter and practice management system software.
Features
Backup Protection and Continuity Keep Firms Running
Firms of every size and in every geographic area must protect their electronic data and be prepared for potential IT disasters.
Features
Third Circuit Asked to Clarify Student Internet Speech Cases
Cutting-edge questions in the First Amendment arena have recently stemmed from clashes between students and school districts over the limits ' if any ' that may be imposed on speech posted on social networking sites like MySpace and Facebook. Now lawyers on both sides of the issue are urging the Third U.S. Circuit Court of Appeals to vacate two recent ' and seemingly conflicting ' decisions by two different three-judge panels, and to hold rearguments before the full court.
Features
Active Inducement In the Post-Grokster World
This article discusses the theory of active inducement in copyright law, the evolution of P2P technology over the past decade, recent U.S. and foreign legal decisions, and developments impacting copyright holders, file-sharing networks and Internet service providers.
Features
Blogging and Your Business
As a marketer, know that if your employees post a blog comment, or an entry on Facebook or Twitter about your company or its products, a number of questions are raised. Is your company responsible for what is said?
Features
Electronic Data Breaches
There are a few judicial decisions indicating the likely issues on which a coverage dispute will focus when a claim for a data breach is made under a CGL policy.
Features
Law Firm Intelligence: CI on the Internet
Looking for information on a rival law firm? Trying to get some background on a prospective client? The Internet is full of useful resources that can meet your needs.
Features
Blogging and Your Business
As in-house counsel, if your employees post a blog comment, or an entry on Facebook or Twitter about your company or its products, a number of questions are raised. Is the company responsible?
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Legal Possession: What Does It Mean?Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Cutting Off the Stream: How United States v. Silver Affects "Stream of Benefits" or "Retainer" BriberyAlthough the court stressed that, by vacating certain of former NY State Assembly Speaker Sheldon Silver's counts of conviction, it was clarifying and not altering the "as opportunities arise" theory, it nevertheless emphasized that this theory requires particularity with respect to the "question or matter" that is the subject of the bribe payor and recipient's corrupt agreement.Read More ›