Features
Changing Internet Pharmacy Legal Standards
Telemedicine, on the scene medically and legally for several decades, is an area ' in the form, strictly speaking, of providing some kind of health care or health-care products or services ' under the Big Top of the Internet fair that is subjected regularly to regulatory scrutiny, debate, enforcement actions, improvements and all the other aspects of e-commerce, although sometimes at a slower pace than within the sector's other channels.
Features
Solving an IP Practice Business Need with Patricia
In January 2003, Duane Morris recognized a need to provide a better IP docketing system. The new docketing system needed to be user-friendly and give users the ability to create reports quickly and efficiently. It also needed to provide a flexible solution for incorporating the dockets of lateral hires during the firm's growth cycle and to integrate the firm's nine separate IP docketing databases into a master database. Finally, it was vital that it work well within the firm's existing infrastructure.
Features
<i>Product Review</i>: BigHand Digital Dictation Improves Workflow
As part of my role as Firm Administrator, productivity lags, as well as bottlenecks and workflow issues concerning flow of information and documents, are all brought to my attention ' sooner or later ' and obviously require swift action. We were faced with a big challenge when we began to rate the efficacy of our existing dictation technology and best practices of delivering dictations.
Features
Practical Advice for European Electronic Discovery Projects
If you are a U.S.-based IT or litigation support professional, have you ever received an e-mail message that ended like this: "And there are three people in the Munich office"? If you have not, you may very well receive such a message within the next few months. This article provides practical advice for European electronic discovery projects for litigation support and IT professionals.
Features
Determining an e-Mail Management Strategy
Legal IT professionals are challenged with finding the most efficient and appropriate e-mail management model while considering the rising cost of e-discovery and ethical issues surrounding e-mail retention. Against this demanding backdrop, firms must determine which of three potential e-mail management strategies to employ: passive, active or a combination of the two.
Features
e-Commerce Docket Sheet
Web Arbitration Clause Before Purchase Does Not Cancel Unconscionability<br>Web Host Gets CDA Immunity for Alleged Defamatory Site Content <br>Game 'Cheat' Software Circumventing Security Does Not Violate DMCA<br>Late Option Exercise Under License Not Excused on Equitable Grounds <br>Print-on-Demand Publisher Not Liable for Alleged Defamatory Book
Features
e-Curing the Holiday Humbug
Anyone trying to keep an e-commerce site afloat didn't ' and still doesn't ' need to read the newspaper to realize the business downturn: the grim news appears every day in the cash till, in the aging-of-receivables report, and in overdue payables. While the down times are as inevitable a part of a business cycle as the booming times, that realization doesn't satisfy the bank, the critical vendor at the door or the payroll processor that must be paid.
Features
Search Engine Optimization Raises Bar for Law Firm Web Sites
Search engines compete with each other on their ability to guide users to relevant content. The search engines, therefore, reward those Web pages that provide useful content to their consumers with high rankings. To understand how to get the most out of search engine optimization, it is important to learn how search engines catalogue and evaluate trillions of Web pages to determine which one is most relevant to a given search query.
Features
The Trouble with Anonymous Bloggers
cyberspace enables anyone willing to spring for a domain name and pay an Internet service provider $15 a month to become a "publisher." And even better for these latter-day Horace Greeleys, they can corral a limitless number of "reporters" without paying one red cent. Small wonder that blogging has become a force of mainstream media. Indeed, blog owners basically need only to grant anonymity to those who post to their Web sites.
Features
Whose Space? Discoverability of Social Networking Web Sites
This article explores a social networking site user's right to privacy, an adversary's right to obtain information from that site, and the admissibility of the information.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Inferring Dishonesty: The Fifth Amendment and Fidelity CoverageDishonest employees always have posed a problem for businesses. The average business may lose 6% of its annual revenues to employee fraud, and cumulatively the impact of employee theft on the economy is estimated to be $600 billion annually. <i>See</i> Association of Certified Fraud Examiners ("ACFE"), 2002 Report to the Nation on Occupational Fraud & Abuse, at ii, 4 (2002), available at <i>www.cfenet.com/publications/rttn.asp.</i> Although the average loss through employee embezzlement is $25,000, where computerized financial records or transactions are involved, the average loss increases nearly twentyfold. <i>See</i> National White Collar Crime Center, <i>WCC Issue: Embezzlement/Employee Theft,</i> at 2 (2002), available at <i>http://nw3c.org/downloads/Computer_Crime_Weapon.pdf.</i>Read More ›
- When Is a Repair Structural or Nonstructural Under a Commercial Lease?A common question that commercial landlords and tenants face is which of them is responsible for a repair to the subject premises. These disputes often center on whether the repair is "structural" or "nonstructural."Read More ›