Features

<b><i>BREAKING NEWS</b></i> <br> Chicago's Johnson & Bell First U.S. Firm Publicly Named in Data Security Class Action
In the first public data security class action complaint against a U.S. law firm, Chicago-based Johnson & Bell was named in a lawsuit that says the firm failed to protect confidential client information.
Features

The Bermuda Form
<b><i>Declaring an Integrated Occurrence (or Not)</b></i><p>Many Fortune 500 companies' product liability insurance programs use the Bermuda Form to insure alleged bodily injury and property damage. The Bermuda Form has many characteristics distinct from standard commercial general liability (CGL) policies. Knowing its intricacies is essential for any coverage lawyer involved in large-scale coverage analysis and disputes.
Columns & Departments
Case Notes
News Agencies Wanted Trump's Divorce Records: Judge Said 'No'<br>NJ Alimony Reduction Amendments May Be Applied Retroactively<br>Conviction Upheld: Divorced Man Threatened to 'Kill and Eat' Judge and His Family
Features

Salvaging a Patent After a Post-Grant Proceeding
When the Patent Trial and Appeal Board (PTAB) decides to institute a post-grant proceeding, the subject patent is in jeopardy.
Features

Retiring Boomers Pose Big Challenges For Firms
The boomer generation — 75 million Americans born between 1946 and 1964 — and a tiny cadre of over-70s Silent Generation lawyers currently make up just under half of partners at Am Law 200 firms. As partners with the greatest seniority, they constitute a majority in the equity and management ranks, and control an outsize share of client relationships. The impacts of retirement are amplified because a long surge in hiring and promotion that began when boomers entered law firms has halted since the financial crisis.
Features

Duty to Warn and Third-Party Conduct: A Look at Two Recent New York Cases
In the past year, New York's highest court, the Court of Appeals, issued two decisions addressing both the scope of a defendant's duty to warn in negligence and products liability actions, and the scope of tort liability in actions predicated upon third-party conduct.
Features

Managing Risk in Light of 'Shadow IT'
Information Governance in the Age of Cloud Application Proliferation
Features

Law Firms, Meet Your New Regulator: Your Clients
While major banks, retailers, hospitals and insurance companies were the brick and mortar of a growing media monument to hubris and cyber overconfidence, law firm breaches went mostly unnoticed. That is, until government agencies and law enforcement grew concerned that the wealth of intellectual property curated by law firms could be used to manipulate financial markets by front running trades.
Features

Client Document Security Audits: Is Your Law Firm Ready?
It is essential for all law firms to safeguard their clients' documents against ever-evolving threats and thoroughly understand the security challenges and potential solutions in today's demanding world of legal document compliance.
Features

Looking to the FFIEC Revised Information Security Booklet for Best Practices in Data Security for Financial Institutions
The Federal Financial Institutions Examination Council (FFIEC) recently revised its Information Security Booklet. The changes bring the financial services industry closer to the goal of having a clearly defined set of cybersecurity and data protection protocols to ensure regulatory compliance.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- How the U.S.-China Trade War Effects IP StrategyThe trade war between the United States and China has had far-reaching effects on international trade and the global economy. The dispute is slowly developing into a battle of attrition, without any immediate resolution on the horizon despite ongoing trade talks. As businesses change the way they operate in response to this unpredictable trade environment, counsel should consider the risks and potential impacts on corporate IP strategy.Read More ›
- Legal Possession: What Does It Mean?Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.Read More ›