Features

Perspectives on Blockchain and the Music Industry
A Q&A with Entertainment Lawyer Leslie Zigel
Features

Competitive Intelligence: What Is Your Dashboard Report Telling You? Chances Are, Not Much.
Until recently, most law firms operated with a cadre of legacy operating systems, financial platforms and reporting technologies from different manufacturers that have no mechanism for connecting with each other, let alone automatically extracting and updating data points between systems. The disparate nature of these technologies has exacerbated the struggle to leverage data and display results in a reporting mechanism that helps direct the firm's decision-making.
Features

Marketing Tech: Five Quick and Easy Ways to Hack Your Business Development
The most popular justification for avoiding business-development activities is a lack of time. There are, however, a number of strategies that will allow you to execute and produce results in minutes — or even seconds.
Features

Takeaways from the Recent Qualcomm Decision
The DOJ's intervention, and the judge's ultimate decision, has exposed tensions between the DOJ and FTC, and within the FTC itself, and public scrutiny is far from over as the case heads to the Ninth Circuit on appeal.
Features

5 Quick and Easy Ways to Hack Your Business Development
The most popular justification for avoiding business-development activities is a lack of time. There are, however, a number of strategies that will allow you to execute and produce results in minutes — or even seconds.
Features

Clients Drive Information Governance: Business Benefits Flow to Firm
Information governance and the protection of corporate data are top concerns for law firms. To ensure standards are met, some clients are now tying payment to compliance with Outside Counsel Guidelines (OCG).
Features

Legal Tech: How E-Discovery Trends Are Reshaping E-Discovery Teams
E-discovery, as an industry, is once again at an inflection point. What are the big trends that are exerting pressure on e-discovery teams today — and more importantly, what will an effective e-discovery team look like in the coming years?
Features

Fourth Quarter Educational Events to Stay on Track
A review of upcoming programs and events that bring together many of the most active professionals in the field and its various branches.
Features

The International Encryption Debate: Privacy Versus Big Brother
Although increased reliance on technology such as emails and texts has provided greater opportunity to gather evidence of criminal activity, law enforcement agencies around the world complain that encryption technologies make it difficult to catch criminals and terrorists and therefore should be restricted.
Features

When Key Employees Quit: 5 Things You Must Do to Keep Control of Critical Data
Losing a key employee is never easy — they often take with them institutional knowledge, great internal and external relationships, and critical skill sets. There is also a risk that they'll take some information or data with them when they go, either inadvertently or on purpose.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›