Features
Healthcare Bankruptcy: Not Garden-Variety
For the remainder of 2017, due in part to the current uncertainty in the healthcare industry and its legislative oversight, more financially distressed providers are considering Chapter 11 bankruptcy to effectuate closures, consolidation, restructurings and related transactions.
Features
Enhancing Lateral Partner Opportunities and Compensation
You are a partner in a law firm and you have decided to make a lateral move. You want it to be the right move to a better platform. Where do you start and how do you maximize the likelihood of a successful outcome? The more you are prepared to answer and ask questions, the greater the likelihood this next move will be an optimal one for you and the firm you are joining.
Features
Trust Drafting Tips: How to Make Trusts Harder to Reach in Divorce
<b><i>Part Two of a Two-Part Article</b></i><p>Part One of this article in last month's issue addressed perhaps a dozen trust provisions and evaluated how to strengthen them to provide greater protection for a future divorce of a beneficiary. We conclude this discussion herein.
Features
The State of Data Breach Litigation and How to Avoid It
The number of records compromised in data breaches in 2016 increased an astounding 86% over 2015 breaches. This has led to numerous data breach litigations in the civil and regulatory context. What are the major cases and trends from 2016? And what can organizations do to try to reduce their risks of breaches and litigations?
Features
Institutional Deliberate Indifference
<b><I>Proving Constitutional Violation</b></i><p>Part Two of a Two-Part Article</I></b><p>Conclusion of a discussion about <I>Glisson v. Indiana Dept. of Correction,</I> in which Alma Glisson, whose son Nicholas died while in prison, sued the correctional facility for employing the services of medical contractor Correctional Medical Services, Inc. (Corizon).
Features
Using Computer Forensics to Investigate Employee Data Theft
Departing employees have a sense of ownership over the data that they copy. Intellectual property commonly stolen includes customer lists, secret formulas, source code, strategy documents and other trade secrets. The information is often used against the organization when the former employee goes to work for a competitor or decides to start a new company.
Features
The Challenge of Complying with China's New Cybersecurity Law
In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. The law is set to go into effect June 1, 2017. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.
Features
Sixth Circuit Trims Bank's Good-Faith Defense to Fraudulent Transfer Claims
<b><I>Part One of a Two-Part Article</I></b><p>The issue of what constitutes a good-faith defense to a fraudulent transfer claim is a murky question that has produced a wide variety of reported decisions from appellate courts over the years. But a recent Sixth Circuit opinion sheds some clear light on a complicated fact pattern.
Features
Top Issues for an Acosta Labor Department: Overtime, Gig Workers and the Fiduciary Rule
Secretary of Labor Alexander Acosta, who was confirmed by the Senate late last month, is a veteran government official who is set to hit the ground the running. What direction can labor and employment attorneys expect him to take the agency charged with enforcing many of the nation's workplace laws, and what are issues to watch in the early days?
Features
Trust Drafting Tips: How to Make Trusts Harder to Reach in Divorce
<b><I>Part One of a two-Part Article</I></b><p>Trusts have traditionally been used to protect wealth from divorce. However, what many estate planners refer to as "traditional" trust draftingis not nearly as effective at protecting wealth from the potential risks of divorce as approaches advocated by what some loosely refer to as "modern trust drafting."
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Cost of Making PartnerMaking partner isn't cheap, and the cost is more than just the years of hard work and stress that associates put in as they reach for the brass ring.Read More ›
- Role and Responsibilities of Practice Group LeadersIdeally, the objective of defining the role and responsibilities of Practice Group Leaders should be to establish just enough structure and accountability within their respective practice group to maximize the economic potential of the firm, while institutionalizing the principles of leadership and teamwork.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- Interlocutory Injunctions in the Franchise ContextWhen pending a trial wherein a franchisor seeks to enjoin a franchisee from breaching a restrictive covenant or a franchisee seeks to enjoin a franchisor from terminating their relationship, Canadian courts have generally applied the following three-part test. This article explains.Read More ›