Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


Practice Tip: Spoliation and the 'Bad Faith' Requirement
May 29, 2012
This article underscores the necessity of understanding the importance of preserving evidence given the jurisdictional differences in spoliation law.
Navigating the Stream of Commerce in the Wake of Nicastro
May 29, 2012
What is required to establish the minimum contacts necessary to exert specific personal jurisdiction over a foreign defendant in a forum state?
Outsourcing in the New Legal Model
May 29, 2012
There's a new legal model in town ' ushered in by a new era of law firm client ' requiring firms to streamline operations and capture cost efficiencies at every level while also maintaining the high quality of services on which their reputations are staked.
Germer Gertz Improves Productivity with Secure Document Delivery
May 29, 2012
When you send a document to someone electronically, what's your preferred tool? Do you turn to File Transfer Protocol (FTP)? Or perhaps a thumb drive? For many lawyers and legal professionals (and this won't come as a surprise), the go-to tool is e-mail. It is easy and lawyers get it. But from an IT perspective, e-mail poses many problems.
The Future of the Profession Lies in Its Past
May 29, 2012
If the firm of the future is to compete successfully, the role of the professional is to be aware of the need for thoughtful and professional competition, and to be educated in the skills of competitive marketing.
Finding a Document Management System That Fits
May 29, 2012
Growing a firm without updating the way documents are handled is costly and creates chaos. By consolidating all of these documents into a centralized Document Management Software (DMS) system, you have the ability to put documents at the fingertips of the right people at the right time.
Law Firms and Cyber Security
May 29, 2012
Many law firms today steam along with a false sense of security that the cybercrime lurking in today's electronic channels of commerce does not pose a potentially critical threat. They are wrong.
Consumer Devices, e-Discovery and Security
May 29, 2012
Smartphones, tablets and other portable electronics have swept the nation in the past few years and are now being integrated into people's personal and business lives on a scale heretofore unseen. However, most of these devices were created for the consumer market and not necessarily for business applications. Therefore, confidential, sensitive and proprietary data must be protected both on the device itself and on the corporate network where the data resides.
Debunking the Seven Biggest Myths of Predictive Coding
May 29, 2012
Despite its promise, there are a number of myths associated with the design and use of technology assisted review, and in particular predictive coding, that have obscured the debate around the adoption of this technology. It is time to put an end to some of these myths.
A Guide to Breast-Feeding Policies
May 29, 2012
In-house counsel should examine their companies' breast-feeding policies, including how they handle employees who need time to attend to breast-feeding responsibilities while at work.

MOST POPULAR STORIES