Financing and Leasing Technology Is a Strategic Advantage
May 01, 2017
Advances in technology and software are being made at an increasingly rapid pace. As a result, IT hardware obsolescence cycles are shrinking too. This period of exponential improvement with which we are all now familiar has shown time and again that there will continue to be breakthroughs in technology that deliver better, less expensive, and/or more robust products. How are you equipping your firm to succeed both in the present day and into the future?
Would <b><i>Jevic</i></b> Have Come Out Differently with Gorsuch?
May 01, 2017
In <I>Jevic</I>, the members of SCOTUS — sans Neil Gorsuch, who had not yet been confirmed — declined the invitation to "upend" the absolute priority scheme. The question presented: "Can a bankruptcy court approve a structured dismissal that provides for distributions that do not follow ordinary priority rules without the affected creditors' consent?" SCOTUS's answer: a resounding "No." Would Gorsuch have changed that?
State of the Industry: e-Discovery and Cybersecurity
April 02, 2017
<b><i>Part One of a Three-Part Article</b></i><p>There are stark differences between e-discovery and cybersecurity, most notably that cybersecurity, as an avenue of career opportunity and responsibility, is much, much bigger. An examination of the current state of both industries coupled with a deep dive into the history of e-discovery will offer a prophetic look at the likely hiring patterns, job availability, compensation trends, and industry maturation of the cybersecurity vertical over the next decade.
Are Pharmacy Benefit Managers' Cost-Containment Claims a Shell Game?
April 02, 2017
In today's political climate, one of the hottest topics is the rising cost of healthcare and drugs. Following the last election, all industries should anticipate change, especially in healthcare. While much of the focus is currently on whether the Affordable Care Act will be repealed, one of the areas the government continues to scrutinize is costs.
Information Governance: Law Firms' Cybersecurity Weak Spot
April 02, 2017
Perimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.
Survey Reflects Growth in How Corporations Manage and Protect Information
April 02, 2017
Many organizations are changing their approach to leveraging cybersecurity intelligence through enhanced cooperation, detailed information sharing, and broad-based collaboration. To characterize those shifts and offer perspectives that empower effective benchmarking, for the third consecutive year, Nuix engaged my firm to interview corporate security officials. The report reflects the perspectives of 29 cybersecurity executives across a range of industries.
Institutional Deliberate Indifference
April 02, 2017
<b><i>When a Prisoner's Health Care Is Botched, the Providers' Employer May Be on the Hook</b></i><p>Prisoner Eighth Amendment allegations of cruel and unusual punishment due to deliberate indifference to their medical needs are common; most of them go nowhere. Once in a while, though, the care provided to a prisoner is so substandard that the case actually hurdles the defendants' motion for summary judgment and makes it to trial.