Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Six MetricsThat Matter in Evaluating e-Discovery Image

Six MetricsThat Matter in Evaluating e-Discovery

Zach Warren

Analysis of the e-discovery process before it begins can make a project more efficient and cost-effective, but often, lawyers and document reviewers dive right in without a plan.

Features

Sensitive Data Loss is Not Inevitable Image

Sensitive Data Loss is Not Inevitable

Mark Stevens

Global banking institutions are increasingly pressing outside law firms to demonstrate they are employing top-tier technologies to defend against cyber hackers. In some cases, firms are being asked to fill out 60-page questionnaires detailing their cybersecurity measures in minute detail, while others must consent to on-site inspections.

Features

The Ethical Duty to Be Competent in Technology and e-Discovery Image

The Ethical Duty to Be Competent in Technology and e-Discovery

Mark Noel & Robert J. Ambrogi

Lawyers understand that they have an ethical duty to remain competent in the law and its practice. But far fewer are aware that an emerging body of legal-ethics rules and opinions say that lawyers also have a duty to be competent in relevant technology. And e-discovery, an area of law practice many lawyers still consider a niche, is quickly becoming more relevant to every type of litigation.

Features

Treatment of Social Media Accounts In Bankruptcy Image

Treatment of Social Media Accounts In Bankruptcy

Shmuel Vasser & Negisa Balluku

In today's digital marketplace, understanding how the law applies to virtual assets is becoming as important as understanding how it applies to the brick-and-mortar world. Despite the importance of the Internet to commerce, however, it is still unclear how important provisions of bankruptcy law apply to certain virtual assets.

Features

Digital Ubiquity and the Fourth Amendment Image

Digital Ubiquity and the Fourth Amendment

Richard Raysman & Peter Brown

Pick up pretty much any 21st century smart phone, tablet or PC, and in minutes, a treasure trove of information about its owner can be uncovered. Missives to a significant other, photos from summer vacation, browsing history that spans years; all of this information, generally considered of the most intimate nature, is easily accessible with even a rudimentary technical knowledge of the device's operating system. Needless to say, unwanted disclosure of such information can be highly damaging.

Features

Apple's iPhone User Interface Held Functional for Trade Dress Infringement, But Not Design Patent Purposes Image

Apple's iPhone User Interface Held Functional for Trade Dress Infringement, But Not Design Patent Purposes

M. Michael Lewis & Matthew Siegal

In the long-running <i>Apple v. Samsung</i> dispute, the Federal Circuit has highlighted a marked difference between the effectiveness of trade dress and design patents in protecting the visual characteristics of a product, which could potentially cost Apple hundreds of millions of dollars in lost damages.

Features

Derivative Cyber Litigation Image

Derivative Cyber Litigation

James D. Gassenheimer & Lara O'Donnell

Potential liability for data breaches has emerged as a major concern for businesses in the past few years as massive cyber-attacks are increasing, with companies that use or store private customer data electronically or use social media as part of their marketing strategy being the prime targets. These data breaches have contributed to an increase in director and officer (D&amp;O) litigation in connection with cyber incidents, and will continue to do so.

Features

Building a Vendor Management Program Image

Building a Vendor Management Program

Tim Strong

For law departments, today's business environment is making it increasingly difficult to manage, control or reduce costs while being able to achieve satisfactory results. This is forcing companies to become more efficient in managing and controlling legal costs handled both internally by the organization and externally by outside counsel.

Features

Data Sharing in the Cloud Image

Data Sharing in the Cloud

Gregory Mottla & L. Elise Dieterich

The practical and economic advantages of cloud computing are clear ' it eliminates the need to send client data via traditional, costly methods, and is significantly less expensive than building and maintaining the same data storage capacity in-house. But is the attorney-client privilege at risk?

Features

Goulston & Storrs Embraces Template Management Image

Goulston & Storrs Embraces Template Management

Nancy MacDonald

The firm is always looking to improve service delivery, and in 2014, we were struggling with a template management solution that was falling far short of what the firm wanted. Our mission was straightforward: find a template application that the firm could manage and freely use on its own without external help and that meets the latest technology and software versions.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES