China has seen dramatic economic growth and accompanying legal reforms in recent years, and many companies are now seeking patent protection for their products and technologies in the country. This article provides a basic comparative overview of patent litigation in the United States and China, highlighting their most significant differences.
With so much electronically stored information (ESI), it can be difficult to find the specific answers you are looking for. "Keyword searching" has emerged as a solution to this issue. This article discusses the complicated nature of this solution.
When a company hires an employee away from a competitor, alarms are likely to go off for the in-house counsel. The new employee may be on the up and up, but what happens if your competitor claims that they stole confidential, proprietary, and trade secret information––transferring it all through their email––and are now subpoenaing your company’s computers? Technological advances have made the transferring of such data easy for employees who move around so frequently and in-house attorneys need to know how to respond while protecting their company’s own confidential information.
Opposing counsel can sometimes forget to "scrub" an electronic document clean before sending it for others to view. However, stop and read this article before considering mining the metadata. Ethics rules protect even the forgetful.
Communication mechanisms used by in-house lawyers today are leaps and bounds beyond those used just five years ago. Therefore, the speed at which individuals are expected to respond has drastically decreased, putting more pressure on busy lawyers. Here are seven time management tips for in-house lawyers to alleviate the workload.
A business school education does not necessarily prepare you to be managerially efficient. Here are a few simple tips to help improve your management style.
The information revolution is responsible for quantum leaps in productivity and economic prosperity, but a downside has been the rise in a whole new class of crimes. With 8 primary elements, the comprehensive privacy protection and information security program described in this article is centered on people, processes, and technical management that is standards-based whenever possible.
In Richard Susskind's latest book The End of Lawyers? Rethinking the Nature of Legal Services, he develops his theory that the new information age will ultimately render lawyers obsolete. This article analyzes and critiques this premise from the perspective of in-house counsel.
All organizations, nonprofit or for-profit, need to be clear about what they stand for. And this is where intellectual property law plays a key role.
A young lawyer drops a file on your desk: "We got him cold," he says. "Here are his emails to his lawyer—I bet he has admitted the sexual harassment in some emails to his attorney and once we read them, we can nail him good." But should you open and read them? Something makes you uneasy about reading those emails. Are you right to worry? Yes. While there are cases which would support your claim that the executive waived the attorney-client privilege by using company computers, especially in light of your company policy prohibiting using computers for personal use, the law in this area is neither mature nor settled. Proceed, as they say, at your peril.