Features

The State of Data Breach Litigation and How to Avoid It
The number of records compromised in data breaches in 2016 increased an astounding 86% over 2015 breaches. This has led to numerous data breach litigations in the civil and regulatory context. What are the major cases and trends from 2016? And what can organizations do to try to reduce their risks of breaches and litigations?
Features

Institutional Deliberate Indifference
<b><I>Proving Constitutional Violation</b></i><p>Part Two of a Two-Part Article</I></b><p>Conclusion of a discussion about <I>Glisson v. Indiana Dept. of Correction,</I> in which Alma Glisson, whose son Nicholas died while in prison, sued the correctional facility for employing the services of medical contractor Correctional Medical Services, Inc. (Corizon).
Features

Using Computer Forensics to Investigate Employee Data Theft
Departing employees have a sense of ownership over the data that they copy. Intellectual property commonly stolen includes customer lists, secret formulas, source code, strategy documents and other trade secrets. The information is often used against the organization when the former employee goes to work for a competitor or decides to start a new company.
Features

The Challenge of Complying with China's New Cybersecurity Law
In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. The law is set to go into effect June 1, 2017. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.
Features

Sixth Circuit Trims Bank's Good-Faith Defense to Fraudulent Transfer Claims
<b><I>Part One of a Two-Part Article</I></b><p>The issue of what constitutes a good-faith defense to a fraudulent transfer claim is a murky question that has produced a wide variety of reported decisions from appellate courts over the years. But a recent Sixth Circuit opinion sheds some clear light on a complicated fact pattern.
Features

Top Issues for an Acosta Labor Department: Overtime, Gig Workers and the Fiduciary Rule
Secretary of Labor Alexander Acosta, who was confirmed by the Senate late last month, is a veteran government official who is set to hit the ground the running. What direction can labor and employment attorneys expect him to take the agency charged with enforcing many of the nation's workplace laws, and what are issues to watch in the early days?
Features

Trust Drafting Tips: How to Make Trusts Harder to Reach in Divorce
<b><I>Part One of a two-Part Article</I></b><p>Trusts have traditionally been used to protect wealth from divorce. However, what many estate planners refer to as "traditional" trust draftingis not nearly as effective at protecting wealth from the potential risks of divorce as approaches advocated by what some loosely refer to as "modern trust drafting."
Features

Enhancing Lateral Partner Opportunities and Compensation
You are a partner in a law firm and you have decided to make a lateral move. You want it to be the right move to a better platform. Where do you start and how do you maximize the likelihood of a successful outcome?
Features

Defamation and the Disgruntled Defendant
<b><I>Part One of a Two-Part Article </I></b><p>it is no wonder that those who find themselves on the receiving end of a product liability lawsuit and its attendant bad publicity sometimes fight back. So it was in a recent case, in which a company, publicly accused by a plaintiff's lawyers of using non–FDA-approved medical devices, fought back by bringing a defamation suit against the opposing attorneys.
Features

Using Computer Forensics to Investigate Employee Data Theft
When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft-of-IP analysis in order to preserve electronic data and uncover important evidence.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- The Cost of Making PartnerMaking partner isn't cheap, and the cost is more than just the years of hard work and stress that associates put in as they reach for the brass ring.Read More ›