Features
Modern Evidence in Matrimonial Proceedings
While evidence of adultery used to consist of lipstick smudges on the collar, credit-card receipts from motels and so forth, now it's far more likely to be in the form of text messages, e-mails, IMs or postings on online Web sites. Can these forms of evidence be discovered?
Features
Containing Costs with Concept Searching Saves Clients Thousands
As my firm's Technology Partner, I oversee the e-discovery process for most of the large cases at Severson & Werson. In 2008, one of our clients, a major national bank, was sued by its recently acquired mortgage lending company just after the subprime mortgage financing collapse. The case hinged upon the interpretation of a term in a contract related to the valuation of certain types of subprime loans in the securitization process.
Features
CMS Adoption Rate Should Be Higher
During the fall of 2009, the Legal Technology Institute at the University of Florida Levin College of Law conducted an extensive nationwide survey of the legal profession regarding its use of case, matter and practice management system software.
Features
Backup Protection and Continuity Keep Firms Running
Firms of every size and in every geographic area must protect their electronic data and be prepared for potential IT disasters.
Features
Third Circuit Asked to Clarify Student Internet Speech Cases
Cutting-edge questions in the First Amendment arena have recently stemmed from clashes between students and school districts over the limits ' if any ' that may be imposed on speech posted on social networking sites like MySpace and Facebook. Now lawyers on both sides of the issue are urging the Third U.S. Circuit Court of Appeals to vacate two recent ' and seemingly conflicting ' decisions by two different three-judge panels, and to hold rearguments before the full court.
Features
Active Inducement In the Post-Grokster World
This article discusses the theory of active inducement in copyright law, the evolution of P2P technology over the past decade, recent U.S. and foreign legal decisions, and developments impacting copyright holders, file-sharing networks and Internet service providers.
Features
Blogging and Your Business
As a marketer, know that if your employees post a blog comment, or an entry on Facebook or Twitter about your company or its products, a number of questions are raised. Is your company responsible for what is said?
Features
Electronic Data Breaches
There are a few judicial decisions indicating the likely issues on which a coverage dispute will focus when a claim for a data breach is made under a CGL policy.
Features
Law Firm Intelligence: CI on the Internet
Looking for information on a rival law firm? Trying to get some background on a prospective client? The Internet is full of useful resources that can meet your needs.
Features
Blogging and Your Business
As in-house counsel, if your employees post a blog comment, or an entry on Facebook or Twitter about your company or its products, a number of questions are raised. Is the company responsible?
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- UCC ' 1-203: A Few Lesser (and Not Always Lessor) Known PitfallsThis article discussed the unexpected (and, for a lessor, sometimes unfortunate) consequences that can result by not understanding all the nuances of UCC ' 1-203.Read More ›
- Players On the MoveA look at moves among attorneys, law firms, companies and other players in entertainment law.Read More ›