Features
Six MetricsThat Matter in Evaluating e-Discovery
Analysis of the e-discovery process before it begins can make a project more efficient and cost-effective, but often, lawyers and document reviewers dive right in without a plan.
Features
Sensitive Data Loss is Not Inevitable
Global banking institutions are increasingly pressing outside law firms to demonstrate they are employing top-tier technologies to defend against cyber hackers. In some cases, firms are being asked to fill out 60-page questionnaires detailing their cybersecurity measures in minute detail, while others must consent to on-site inspections.
Features
The Ethical Duty to Be Competent in Technology and e-Discovery
Lawyers understand that they have an ethical duty to remain competent in the law and its practice. But far fewer are aware that an emerging body of legal-ethics rules and opinions say that lawyers also have a duty to be competent in relevant technology. And e-discovery, an area of law practice many lawyers still consider a niche, is quickly becoming more relevant to every type of litigation.
Features
Treatment of Social Media Accounts In Bankruptcy
In today's digital marketplace, understanding how the law applies to virtual assets is becoming as important as understanding how it applies to the brick-and-mortar world. Despite the importance of the Internet to commerce, however, it is still unclear how important provisions of bankruptcy law apply to certain virtual assets.
Features
Digital Ubiquity and the Fourth Amendment
Pick up pretty much any 21st century smart phone, tablet or PC, and in minutes, a treasure trove of information about its owner can be uncovered. Missives to a significant other, photos from summer vacation, browsing history that spans years; all of this information, generally considered of the most intimate nature, is easily accessible with even a rudimentary technical knowledge of the device's operating system. Needless to say, unwanted disclosure of such information can be highly damaging.
Features
Apple's iPhone User Interface Held Functional for Trade Dress Infringement, But Not Design Patent Purposes
In the long-running <i>Apple v. Samsung</i> dispute, the Federal Circuit has highlighted a marked difference between the effectiveness of trade dress and design patents in protecting the visual characteristics of a product, which could potentially cost Apple hundreds of millions of dollars in lost damages.
Features
Derivative Cyber Litigation
Potential liability for data breaches has emerged as a major concern for businesses in the past few years as massive cyber-attacks are increasing, with companies that use or store private customer data electronically or use social media as part of their marketing strategy being the prime targets. These data breaches have contributed to an increase in director and officer (D&O) litigation in connection with cyber incidents, and will continue to do so.
Features
Building a Vendor Management Program
For law departments, today's business environment is making it increasingly difficult to manage, control or reduce costs while being able to achieve satisfactory results. This is forcing companies to become more efficient in managing and controlling legal costs handled both internally by the organization and externally by outside counsel.
Features
Data Sharing in the Cloud
The practical and economic advantages of cloud computing are clear ' it eliminates the need to send client data via traditional, costly methods, and is significantly less expensive than building and maintaining the same data storage capacity in-house. But is the attorney-client privilege at risk?
Features
Goulston & Storrs Embraces Template Management
The firm is always looking to improve service delivery, and in 2014, we were struggling with a template management solution that was falling far short of what the firm wanted. Our mission was straightforward: find a template application that the firm could manage and freely use on its own without external help and that meets the latest technology and software versions.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business AlliesPractical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.Read More ›
- Issues in Reverse Morals Clauses In Talent Influencer Contracts With Product BrandsThe next company general counsel to slide a morality clause across the desk for a celebrity or web influencer to sign shouldn't be surprised if that talent also whips out a morals clause, one to cancel the contract if the company's brand acts immorally.Read More ›
- Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary SupportThe International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›