Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Regulation

Features

Combating Counterfeiting Image

Combating Counterfeiting

Camille M. Miller, Elizabeth Lai Featherman

Online counterfeit sellers are increasingly more sophisticated and are engaging in social media counterfeiting to exploit social media tools to bolster their sales of counterfeit products online.

Features

Quarterly State Compliance Review Image

Quarterly State Compliance Review

Sandra Feldman

This edition of the Quarterly State Compliance Review looks at some legislation of interest to corporate lawyers that went into effect between Jan. 1, 2014 and April 1, 2014. It also looks at some recent decisions of interest, including three from the Delaware courts.

Features

Supreme Court Grants <i>Cert</i> in <i>Aereo</i> Case Image

Supreme Court Grants <i>Cert</i> in <i>Aereo</i> Case

J. Alexander Lawrence, David S. Brown

<i>Aereo</i>may turn out to be one of the most important copyright decisions since enactment of the Copyright Act of 1976, with potential wide-ranging ramifications for the television industry and the fast-growing cloud computing industry.

Features

The Implied Covenant of Good Faith and Fair Dealing under U.S. Law Image

The Implied Covenant of Good Faith and Fair Dealing under U.S. Law

Beata Krakus

It is a truth universally acknowledged that even the most well-written agreement never covers all potential issues that may arise in the future, and that when the rubber hits the road, the parties to the agreement never interpret its terms the same way.

Features

Privacy and Ethics For Social Media In Investigations Image

Privacy and Ethics For Social Media In Investigations

William Michael Jr. & Laura Hammargren

It begins with a name ' perhaps an employee alleged to have been involved in misconduct or a suspected whistleblower. Regardless of the origin of identity, if the person is relevant to a company's internal investigation, whatever information that can be provided is power for the company, the power to make informed decisions.

Features

The Ethical Boundaries of Attorney Whistleblowers Image

The Ethical Boundaries of Attorney Whistleblowers

Lawrence S. Spiegel & Esther E. Bloustein

In recent years, federal legislation has encouraged attorneys to become whistleblowers. These rules are in tension with the lawyer's duties of confidentiality and avoiding conflicts predicated on attorney self-interest because they allow disclosure of client confidential information more broadly than do applicable ethics rules.

Features

Key Privacy Law Developments Image

Key Privacy Law Developments

Jay Edelson & Chandler Givens

Earlier this year, President Obama addressed the nation to outline steps he will take to rein in the surveillance activities of the National Security Agency. Obama noted that "challenges to our privacy do not come from government alone." The President's remarks were the culmination of a year in which consumer privacy issues have roared into the public narrative, and they underscore a theme that privacy lawyers had already sensed about their practice by the end of 2013: The tide is changing.

Features

DE Supreme Court Eases Social Media Authentication Image

DE Supreme Court Eases Social Media Authentication

Jeff Mordock

Social media postings can be submitted as trial evidence as long as the party introducing the evidence can demonstrate to the judge that a jury could reasonably conclude the postings are authentic, the Delaware Supreme Court has ruled.

Features

Best Practices for Comprehensive Searchability Image

Best Practices for Comprehensive Searchability

Dean Sappey

Most law firms now proudly proclaim that they have implemented efficient and secure document management systems, systems in which they have invested significant dollars and even more in "sweat equity." The end goal of these systems is to ensure that all documents are stored securely, and perhaps more importantly, can be found quickly and easily.

Features

We Need to Cut a New Deal on Communications Privacy Image

We Need to Cut a New Deal on Communications Privacy

David R. Johnson

It is (high) time to rewrite and modernize the law that regulates access to our private communications and to the detailed information those communications automatically create.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Technology in Marketing: Where to Invest Your Marketing Technology Dollars
    Law firms have realized that using technology ' particularly the Internet ' is a powerful tool for creating a more level playing field to enhance their images, expand their visibility in targeted markets and drive business to their firms. However, with so many competing interests for limited marketing dollars, where should you invest your firm's resources to get the most bang for the buck?
    Read More ›
  • Coverage Issues Stemming from Dry Cleaner Contamination Suits
    In recent years, there has been a growing number of dry cleaners claiming to be "organic," "green," or "eco-friendly." While that may be true with respect to some, many dry cleaners continue to use a cleaning method involving the use of a solvent called perchloroethylene, commonly known as perc. And, there seems to be an increasing number of lawsuits stemming from environmental problems associated with historic dry cleaning operations utilizing this chemical.
    Read More ›