Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Litigation Image

Litigation

ALM Staff & Law Journal Newsletters

Analysis of a recent case of interest.

Shirking or Just Hard Times? Image

Shirking or Just Hard Times?

Mary Cushing Doherty & Margaret Wrenn Hickey

In a bad economy, a range of recent decisions can be cited to overcome the argument that an earning capacity in excess of current income should be attributed to a parent.

First-Time DMS for Lindsay Kenney: The Choice Is Worldox Image

First-Time DMS for Lindsay Kenney: The Choice Is Worldox

Dirk Fleming

For many years, the firm managed its electronic documents and files without a document management system (DMS) by using Windows Explorer to navigate folders and Windows Search to execute searches when needed. However, we reached the point where we had approximately 1.2 million documents (mostly Word documents) across both offices, sorted by year, client and matter, and were not searchable in an efficient way. We wanted to select a DMS that could easily store client-related e-mails in the same repository as the other documents, and provide efficient searching functionality.

<i><b>Case Study</b></i> Aon's Matter Management Solution Image

<i><b>Case Study</b></i> Aon's Matter Management Solution

David Cambria

Aon experienced significant growth in the 1980s and 90s, both organically and through a series of strategic acquisitions. The growth brought about tremendous business gains, but created operational challenges that lingered for many years. One of these was the legal department.

Focusing on the Business Process, Not the Technology Image

Focusing on the Business Process, Not the Technology

David E. Otte

When selecting and implementing new technology, many CIOs and IT professionals are challenged when the business process that the application is supposed to address plays second fiddle to focusing on a specific technology or product. With a new technology implementation, many key business sponsors (i.e., owners of the application or department leaders whose teams use the application) want to be involved in the selection process, weighing in on requirements, definition, functionality, "look and feel" and expected output. This is similar to building a new home: The new homebuilder wants to select the style of home, amenities, paint, etc. In both scenarios, the buyers are concerned with the output, which is very understandable, as they desire useable products.

Electronic Discovery's Impact: Policies, Technology and Security Image

Electronic Discovery's Impact: Policies, Technology and Security

John Connell & R. Jason Straight

This was the decade of electronic discovery. Rapid development of technology, law and business processes, both in and out of the courtroom, brought legal and technical issues involving electronically stored information (ESI) to the fore. Although the General Counsel's office was the primary recipient of this uninvited wake-up call, legal is not the only department impacted by this change. IT departments across organizations must now understand the impact of ESI discovery obligations and regulations. Collaboration with legal is needed to create and implement new policies, while altering existing policies to keep pace with the rapidly evolving data storage and communication methods coinciding with the rising tide of ESI.

Features

What's All This Talk About ROI of Social Media? Image

What's All This Talk About ROI of Social Media?

Lisa Tierney

There are many discussions going on about the use of social media among attorneys. Surely there are folks who don't understand the value of these mediums, mostly because of inexperience in using them. "Why should I go on Twitter and tell someone what I'm doing? Who is going to care?" they ask. To those people, I would suggest turning that question around: "When I have just heard a piece of important and timely information that would benefit some of my colleagues, how can I tell them all at once ' easily and quickly?" Now that's the question to be asking.

Recognizing and Handling Online Fraud and Scams Using Company IP Image

Recognizing and Handling Online Fraud and Scams Using Company IP

Richard E. Peirce

The Internet as we know it has evolved into an almost limitless arena where just about everything short of physical activity can be done. This online "playground" allows a user to read magazines, research current events, share photographs, transact business, enjoy life through a virtual character, organize class reunions, and update friends that you just finished a great meal at your favorite restaurant. Yet, this playground is generally an unguarded realm that gives thieves, criminals and other troublemakers opportunities to make money through the use of sophisticated scams and frauds. These scammers are looking for any information that can be used for profit, such as Social Security numbers, credit card numbers, user names/passwords and bank account numbers.

Features

Service Credits in the Cloud Image

Service Credits in the Cloud

Evan Henschel & Eric Swibel

Service providers need incentives to continue providing top-notch service.That is what most customers believe. Whether a customer engages a vendor for cloud computing, software offered as a service ("SaaS"), outsourcing, or simply the maintenance aspect of a traditional software licensing agreement, if an element of the deal is for the vendor to provide ongoing services, the customer will always seek a financial lever to provide the vendor with an incentive to perform.

Features

Bit Parts Image

Bit Parts

Stan Soocher

Independent Artist Has No Claim to Radio Airplay<br>Music-Royalty Conversion Claim Improperly Pleaded<br>Six-Month Suspension for Georgia Lawyer over File-Sharing Defense

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Legal Possession: What Does It Mean?
    Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
    Read More ›