Features
Measuring the ROI of Strong Information Governance Processes
Information governance requires a firm-wide approach for managing and protecting client information. By taking a proactive approach and laying out the business case through the measurement of the return on investment of information governance, law firms realize significant savings, improve client service and minimize risk.
Features
Imposing Liability Under DMCA Counter-Notification Provision
Although seemingly dry, the few cases heretofore that have confronted questions surrounding misrepresenting takedown notices have contained facts that are arguably ripped from the tabloids, including a bitter dispute between bloggers over the proper method of childbirth, and a kerfuffle arising from the wider publication of the views of a pro-straight pride organization in the U.K.
Features
Easy-to-Use Collection Technology Leads to Lower e-Discovery Costs
Corporate legal departments are all about cost control and efficient processes, yet when hit with a new investigation or lawsuit, legal teams often reflexively fall back on the "collect everything" mentality. The emergence of targeted and remote collection technologies now makes it possible for corporations to collect in a legally defensible way that reduces cost and minimizes business disruption.
Features
Transgender Employees' Access to Restrooms In the Workplace
Employers with transgender employees should be aware of recent developments in the interpretation of laws for transgender employees, especially in relation to an employee's access to restroom facilities while at work. The following provides a brief explanation of the law and the steps an employer can take to ensure that all employees remain comfortable in using restroom facilities.
Features
Using Unlicensed Photos On Websites
For a long time, people have generally felt it appropriate to go onto various image search engines, find a photo and then cut and paste it into their publication or website. One of the reasons this was so easy to get away with was that there was no effective way for photographers to find unlicensed uses of their work. Of late, however, photographers either have acquired new technology or have engaged search companies that have image-searching technology.
Features
Ipro Suite Helps Houston Firm Increase Efficiency
Despite our firm's technological savvy, the burden of growing discovery volumes was challenging to manage. We were experiencing performance and workflow issues on all cases with over 150,000 documents, forcing us to send the larger cases to outside vendors, adding time and cost to every case. Our goal was to find a new in-house solution that could process and search vast amounts of data quickly and provide our attorneys with powerful analytic tools to use in early case assessment (ECA) and strategy development.
Features
Data Sharing in the Cloud
Storing and sharing data "in the cloud" has become, in many instances, a business necessity. The practical and economic advantages of cloud computing are clear ' it eliminates the need to send client data via traditional, costly methods, and is significantly less expensive than building and maintaining the same data storage capacity in-house.
Features
The Difference in Due Diligence for Franchisors
In any business purchase, investment, merger or acquisition, several threshold questions come to mind. What assets are being acquired? Where is the value in the target company? What liabilities are being acquired? How should these be valued for pricing and future growth? What will the acquirer do with the target company? How far can management take the new target?
Features
Structured Data e-Discovery
Courts are increasingly ordering counsel to identify and produce information beyond traditional e-mail and loose files. Whether its employee and payroll data related to a wage and hour dispute or trade data related to a market manipulation investigation, understanding the EDRM as it relates to increasingly larger volumes of structured data has never been a more critical e-discovery capability.
Features
A Six-Step Data Privacy Program Health Check
Data protection is the responsibility of every individual in the company, and the legal and IT departments should only be drafting contractual languages, policies, and guidelines while working in tandem with each other.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- Supreme Court Asked to Assess Per Se Rule Tension in Criminal AntitrustIn recent years, practitioners have observed a tension between criminal enforcement of the broadly written terms of the Sherman Antitrust Act of 1890 and the modern Supreme Court's notions of statutory interpretation and due process in the criminal law context. A certiorari petition filed in late August in Sanchez et al. v. United States, asks the Supreme Court to address this tension, as embodied in the judge-made per se rule.Read More ›
- Restrictive Covenants Meet the Telecommunications Act of 1996Congress enacted the Telecommunications Act of 1996 to encourage development of telecommunications technologies, and in particular, to facilitate growth of the wireless telephone industry. The statute's provisions on pre-emption of state and local regulation have been frequently litigated. Last month, however, the Court of Appeals, in <i>Chambers v. Old Stone Hill Road Associates (see infra<i>, p. 7) faced an issue of first impression: Can neighboring landowners invoke private restrictive covenants to prevent construction of a cellular telephone tower? The court upheld the restrictive covenants, recognizing that the federal statute was designed to reduce state and local regulation of cell phone facilities, not to alter rights created by private agreement.Read More ›
