Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Modern Evidence in Matrimonial Proceedings Image

Modern Evidence in Matrimonial Proceedings

Stephen A. Zorn & Sophie Jacobi

While evidence of adultery used to consist of lipstick smudges on the collar, credit-card receipts from motels and so forth, now it's far more likely to be in the form of text messages, e-mails, IMs or postings on online Web sites. Can these forms of evidence be discovered?

Features

Containing Costs with Concept Searching Saves Clients Thousands Image

Containing Costs with Concept Searching Saves Clients Thousands

Bruce N. Furukawa

As my firm's Technology Partner, I oversee the e-discovery process for most of the large cases at Severson & Werson. In 2008, one of our clients, a major national bank, was sued by its recently acquired mortgage lending company just after the subprime mortgage financing collapse. The case hinged upon the interpretation of a term in a contract related to the valuation of certain types of subprime loans in the securitization process.

Features

CMS Adoption Rate Should Be Higher Image

CMS Adoption Rate Should Be Higher

Andrew Z. Adkins III

During the fall of 2009, the Legal Technology Institute at the University of Florida Levin College of Law conducted an extensive nationwide survey of the legal profession regarding its use of case, matter and practice management system software.

Features

Backup Protection and Continuity Keep Firms Running Image

Backup Protection and Continuity Keep Firms Running

Darryl d'Aquin

Firms of every size and in every geographic area must protect their electronic data and be prepared for potential IT disasters.

Features

Third Circuit Asked to Clarify Student Internet Speech Cases Image

Third Circuit Asked to Clarify Student Internet Speech Cases

Shannon P. Duffy

Cutting-edge questions in the First Amendment arena have recently stemmed from clashes between students and school districts over the limits ' if any ' that may be imposed on speech posted on social networking sites like MySpace and Facebook. Now lawyers on both sides of the issue are urging the Third U.S. Circuit Court of Appeals to vacate two recent ' and seemingly conflicting ' decisions by two different three-judge panels, and to hold rearguments before the full court.

Features

Active Inducement In the Post-Grokster World Image

Active Inducement In the Post-Grokster World

Richard Raysman & Peter Brown

This article discusses the theory of active inducement in copyright law, the evolution of P2P technology over the past decade, recent U.S. and foreign legal decisions, and developments impacting copyright holders, file-sharing networks and Internet service providers.

Features

Blogging and Your Business Image

Blogging and Your Business

Barbara E. Hoey

As a marketer, know that if your employees post a blog comment, or an entry on Facebook or Twitter about your company or its products, a number of questions are raised. Is your company responsible for what is said?

Features

Electronic Data Breaches Image

Electronic Data Breaches

Joseph Geoghegan, Laurie A. Kamaiko & Dennis O. Brown

There are a few judicial decisions indicating the likely issues on which a coverage dispute will focus when a claim for a data breach is made under a CGL policy.

Features

Law Firm Intelligence: CI on the Internet Image

Law Firm Intelligence: CI on the Internet

Mark Gediman

Looking for information on a rival law firm? Trying to get some background on a prospective client? The Internet is full of useful resources that can meet your needs.

Features

Blogging and Your Business Image

Blogging and Your Business

Barbara E. Hoey

As in-house counsel, if your employees post a blog comment, or an entry on Facebook or Twitter about your company or its products, a number of questions are raised. Is the company responsible?

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›