Features
Practice Tip: Proposed Changes to the FRCP Regarding Discovery of Electronically Stored Information
On Dec. 1, 2006, new amendments to the Federal Rules of Civil Procedure addressing discovery of electronically stored information will take effect unless Congress enacts legislation to reject, modify, or defer the amendments. The amendments to Rules 16, 26, 33, 34, 37, and 45, which were approved by the U.S. Supreme Court on April 12, 2006, attempt to bring the discovery rules up-to-date in an Information Age where the majority of new communication and information is now created, disseminated, and stored in electronic media.
Features
e-Discovery Docket Sheet
Recent court rulings in e-discovery.
Features
On the Case
In the legal realm, concern about the security of sensitive data during transport has never been higher. Attorneys from coast to coast have watched the headlines and read countless articles about files and tapes that have been lost or stolen while being moved from Point A to Point B ' during legal discovery activities, perhaps, or to satisfy compliance requirements.<br>As a result, law firms and corporate in-house counsel are investigating more dependable methods for securing information during transit, when it is most vulnerable. Many of these experienced denizens of e-data have concluded that encryption provides the greatest protection throughout the chain of custody, and that this locked-door method of data security can be achieved at a relatively reasonable cost.
Features
Prepare for e-Discovery
With state laws governing the capture and securing of evidence ' including electronic data ' the possibility of spoliation is a genuine concern. Not only could evidence subjected to spoliation be inadmissible, but misdemeanor or felony charges could apply to the collector and the contracting party.<br>Identifying electronic evidence, much like in a physical crime scene, starts with drawing increasing concentric circles around the victim or perpetrator. Some care must be taken regarding a company's policies and practices. State and federal law on personal property may be involved if the employee used personal devices legally or illegally in combination with the company's assets, and a warrant or commencement of discovery may be required to access personal property or equipment on private property.
Features
e-Mail Job Termination Notices
Traditionally, job-termination notices took the form of a pink slip of paper that employees found in their mailbox or in the envelope carrying their paycheck.<br>Recently, however, tech retailer Radio Shack used e-mails to give more than 400 employees notice of their involuntary separation from the firm. That move probably wasn't the use of technology many in the e-commerce, or the bricks-and-mortar, world envisioned for the business sector.
Features
Betting on Litigation
For all the publicity that our litigious society generates, the decision to sue or not, or even to send a so-called lawyer letter, is often agonizing for any business owners or principals.<br>This dilemma is particularly strong for the smaller firms that compose so much of the e-commerce sector. While the media often perceives lawyers as nothing more than 'ambulance chasers' constantly looking for personal injury lawsuits to stock their personal treasuries, most businesses should prefer to resolve disputes outside the courtroom.
Features
The Video Sites They Are A-Changing
The last few weeks have witnessed further evolution of the world of user-upload sites. MySpace.com and YouTube.com were once youthful rebels; their founders were young, their audience was predominantly under 30. These sites allowed youngsters to post their own video material. This, in turn, enraged copyright holders, because some of the postings used (and sometimes were in entirety) copyrighted material, taken without permission.
Features
Data Mining
The first part of this article discussed the importance and focus of data retrieval in matrimonial actions and the parameters of data mining. The conclusion herein addresses privacy concerns, the impact of e-mail, and the costs of data retrieval.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How Secure Is the AI System Your Law Firm Is Using?In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.Read More ›
- The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business AlliesPractical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.Read More ›
- Issues in Reverse Morals Clauses In Talent Influencer Contracts With Product BrandsThe next company general counsel to slide a morality clause across the desk for a celebrity or web influencer to sign shouldn't be surprised if that talent also whips out a morals clause, one to cancel the contract if the company's brand acts immorally.Read More ›
- Compliance and Third-Party Risk ManagementTo gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.Read More ›
- Why Brand Awareness MattersBuilding brand awareness takes time, effort and consistency. You won't see immediate results, and that can be disheartening. But there's a silver lining: every interaction, every engagement, every mention contributes to your brand awareness.Read More ›