Diversity and Technology in Focus for Morgan Lewis's Incoming Chair
PREVENTING AND RESPONDING TO DATA BREACHES IN AN ERA OF CYBER INSECURITY
Stefan Hankin on Online Harassment
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
A Moment of Simple Justice - Revenge Porn
Why Cyber Security?
How Fenwick Partners Caught the Tech Wave
How is Graphene Currently Used and What is the Hope for the Future?
What is Graphene? Fenwick Patent Attorney Has the Answer
Two Tips for Inventors Filing Patent Applications
Are Criminal Laws the Right Response to Revenge Porn?
Why Law Firms Are Starting to Think Like Media Companies
Schoenbrod: SCOTUS Ruling Helps EPA Deal With a "Stupid Statute"
Protecting and Enforcing Your High Technology Intellectual Property - Webinar Replay
Did the IRS Just Help or Hurt the Bitcoin Economy?
Legal Tech Startups: Separating Hype from Opportunity
Jail Time for Revenge Porn Offenses?
Polsinelli Podcast - Conducting Business in China
Rolling Out LPM Software at Akin Gump
Polsinelli Podcast - Generic Drugs to Market - What's the Climate in 2014?
Your law firm just purchased a license for e-discovery software. Now what? Software implementations can be a substantial challenge for a variety of reasons, including lack of executive buy-in, poorly defined requirements,...more
Cloud computing sales are poised to triple by 2017, according to IHS Technology. With growth comes competition and the potential for disputes, both intellectual property-related and otherwise. This article surveys some of the...more
In today’s business environment, information is a powerful and valuable asset. Organizations that use information wisely and strategically can reach customers faster and with more precision. But in today’s highly regulated...more
The growth of business opportunities in the Bakken region is impressive and looks to continue on an upward trajectory for years to come. Companies that might have been small—or non-existent—just 5 years ago are growing at a...more
If your organization is facing the prospect of a merger investigation and your lawyers haven’t raised the prospect of technology-assisted document review (“TAR”), then maybe you should be talking with someone...more
German companies sometimes are required to collect data for legitimate business purposes, including for compliance, to investigate malfeasance, for adjudication of claims and to protect personal data of customers from misuse....more
Sekisui Am. Corp. v. Hart, 2013 WL 4116322 (S.D.N.Y. Aug. 15, 2013). In this case, Judge Shira Scheindlin reversed an earlier order that denied spoliation sanctions for the plaintiffs’ deletion of ESI. The underlying breach...more
Logtale Ltd.v. IKOR, Inc., 2013 WL 3967750 (N.D. Cal. July 31, 2013). In this misrepresentation case, the plaintiffs sought to compel the defendants to comply with a prior court order and compel production from a defendant...more
The need to stay connected these days applies not only to our social universe, but also to our business universe. The result is a trend known as “bring your own device” or “BYOD.” BYOD is the practice where employees use...more
From the preliminary statement:
"For all its bluster, Rosetta’s opposition to Campmor’s motion in limine falls unsurprisingly short on substance – and never comes close to demonstrating why the jury in this complex...more
This brief opposed a motion by defendant to essentially, we argued, relitigate key issues in the case. The court agreed with the vast majority of our opposition, as demonstrated by the order entered on this motion and linked...more
Memorandum of law in opposition to defendant's ultimately unsuccessful motion to limit key evidence of lost profits and other damages in amounts beyond the stated contract limitations. We demonstrated that under Ohio law,...more
Brief in opposition to several motions in limine brought by defendant in this action. ...more
The term “cloud computing” has been tossed about as the new trend in IT. Unfortunately, just as often has you hear the term echoed as the “next big thing” a comprehensible definition rarely follows. So what is cloud...more
From the preliminary statement:
"Plaintiff Campmor, Inc. (“Campmor”) submits this memorandum of law in support of its motion for an order, pursuant to Federal Rules of Evidence 401, 402 and 403, excluding from trial all...more
Part Three in a multi-part series on the topic.
In Part One of this series, we discussed California’s Electronic Discovery Act. Part Two discussed the importance in legal proceedings of electronic information from social...more
Writing a Data Retention Policy may seem unimportant when there are so many other aspects of running a business that require your attention, but having one in place will save your company lot of time, money, and headache if...more
Originally published on i-Sight.com's blog: “5 Tips for Hiring an E-Discovery Vendor in a Workplace Investigation”
It can be difficult to decide whether to retain an e-discovery vendor if a company is unaware of what the...more
"Reproduced with permission from Law Business Research. This article was first published in Getting the Deal Through - e-Commerce 2013 (published in July 2012; contributing editor:
Robert Bond of Speechly Bircham LLP)....more
As the use of the internet and social media continues to increase rapidly, companies are being challenged to keep up with changing laws and the many ways in which customer and employee data flow in and out of their hands. In...more
Orginally Published in Law360 on February 23, 2012.
Litigation discovery has evolved. Once, discovery meant calling up your client and asking her to look through her files to locate relevant information, resulting...more
If you own a business, your IT staff is likely one of many across the globe who are slowly convincing businesses owners and managers that storing data in “the cloud” is the future. He or she probably pointed out that hiring a...more
IY Wire March 2011 ...more
UK data protection has come of age with large fines levied for the first time and a well-publicised leak from a law firm. Is your law firm compliant with data protection standards?...more
Econtracts Admissibility in Indian Courts , relevant sections under various indian laws are discussed in this article...more
Find a Science, Computers & Technology Author »
Back to Top