Sat.Aug 10, 2019 - Fri.Aug 16, 2019

article thumbnail

Costs Over Damages Doesn’t Equal Exceptional

Liquid Litigation Management, Inc.

What makes a case exceptional? In the matter of ATEN International Co., LTD. v. Uniclass Technology Co., LTD. before the US Court of Appeals for the Central District of California, it was a recently decided that a case is not per se exceptional under 35 U.S.C. § 285 soley because (1) the cost of litigation exceeds plaintiff’s potential damages or (2) a party’s legal argument was rejected on summary judgment.

article thumbnail

Email Security

NSLT

Email Security Best Practices for Law Firms Data safety is an important concept for law firms, and for good reason. Most jurisdictions have rules for lawyers that explain the bare minimum of what they are required to do to protect client data. Email security is an important concept because it is still used to gain information (including login credentials) for critical systems.

professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Ep 048: ROSS Intelligence Founders Andrew Arruda and Jimoh Ovbiagele

LawNext podcast

On this episode of LawNext, host Bob Ambrogi travels to Toronto to sit down for a live recording with the founders of the AI-driven legal research platform ROSS Intelligence , CEO Andrew Arruda and CTO Jimoh Ovbiagele. Along with a third founder, Pargles Dall’Oglio , Arruda and Ovbiagele first developed ROSS at the University of Toronto in 2014, rapidly gaining international attention for what the news media dubbed the robot lawyer of the future.

article thumbnail

Email Security

NSLT

Email Security Best Practices for Law Firms Data safety is an important concept for law firms, and for good reason. Most jurisdictions have rules for lawyers that explain the bare minimum of what they are required to do to protect client data. Email security is an important concept because it is still used to gain information (including login credentials) for critical systems.