Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


Cybersecurity Experts Needed in U.S.
December 01, 2019
The Country Is In Dire Need of Experts Who Possess the Advanced Knowledge, Skills and Experience Required to Combat Cybersecurity Crimes In an effort to protect our financial, personal, medical, and otherwise confidential data, as well as our election systems, we need to continue to attract and employ the services of the most qualified cybersecurity experts from around the world. However, at present, there is a dire shortage of such qualified experts in the United States.
Unique Cyber Risks Faced By the Cannabis Industry
December 01, 2019
All companies face cybersecurity threats, but the legalized cannabis industry's storage of personally identifiable information and reliance on seed-to-sale tracking software can place it firmly within hackers' crosshairs.
Legal Tech: New Data Types Challenge E-Discovery to Keep Pace
December 01, 2019
Expanding the Scope of Data Has the Potential to Slow Down Discovery and Increase Cost, But If New Data Types Contain Uniquely Dispositive Content, It Will Be Necessary to Include Them In Order to Achieve Just Determinations Data types evolve faster than law. New data types are expanding the scope of discoverable data. The variety, velocity and complexity of electronic evidence challenge legal processes and the technology-enabled legal applications that are designed to support them.
Some Guidance on Federal Securities Law and Film Financing Disputes
November 01, 2019
Disputes over film financing agreements are common, but there are few court decisions that address film financing dustups involving §10(b) of the federal Securities Exchange Act. Now the U.S. District Court for the Middle District of Florida has issued a ruling that addresses the pleading requirements for alleging a §10(b) violation, in litigation between an investor and a film production company.
Safeguarding Your Intellectual Property
November 01, 2019
The documents that a firm produces are its greatest asset, yet firms historically have not made sufficient efforts to safeguard those documents from both internal and external threats. Law firms have typically had an open-door approach to document access. This means that anyone in your firm can likely access any document at any time, leaving your firm's intellectual property entirely unprotected.
What Is the Appropriate Statute of Limitations Period for BIPA Claims?
November 01, 2019
The BIPA compliance lag has led companies using or collecting biometric information to consider how far back their liability may extend. The Illinois General Assembly, however, did not include an explicit statute of limitations period in BIPA. As a result, the statute of limitations has become one of BIPA's primary battlegrounds as litigants argue about potential class sizes and damages awards.
'Weinstein' Clauses In Acquisition Agreements
November 01, 2019
The purpose of a Weinstein clause is to provide assurance that the target company (including its officers and executives) is not a hotbed of sexual harassment or a ticking time bomb of claims waiting to explode. This article on drafting and negotiating Weinstein clauses should help entertainment and media deal teams balance these risks.
'Dirt for Debt' In Bankruptcy Plans of Reorganization
November 01, 2019
A debtor's goal in a Chapter 11 Bankruptcy is to confirm a "plan of reorganization." Creditors usually have the right to vote for or against a plan, and in some cases, a plan can be confirmed over the objection of one or more classes of creditors. This is called a "cram-down." The Bankruptcy Code's rules governing cram-down are complex and differ for secured and unsecured classes of creditors. This article shows how bankruptcy courts have ruled on a particular method of cram-down known as a "dirt-for-debt" plan.
Determining Who Should Serve As the Billing Partner
November 01, 2019
Due to a law firm's team-oriented approach to business development and client service efforts, it is not always clear who should logically and most efficiently serve as the billing partner for a client or a particular client matter. A person should only be a billing partner if he or she is or will be performing the functions outline herein.
How to TOOT Your Own Horn: Exceptional Self Evaluations
November 01, 2019
It's that time again. As the year comes to a close many firms are beginning the associate review process. Even if your firm does not have a formal review process I recommend that you write a self-evaluation that outlines your achievements and specifies your goals for the coming year.

MOST POPULAR STORIES

  • Yachts, Jets, Horses & Hooch: Specialized Commercial Leasing Models
    Defining commercial real estate asset class is essentially a property explaining how it identifies — not necessarily what its original intention was or what others think it ought to be. This article discusses, from a general issue-spot and contextual analysis perspective, how lawyers ought to think about specialized leasing formats and the regulatory backdrops that may inform what the documentation needs to contain for compliance purposes.
    Read More ›
  • Identifying Your Practice's Differentiator
    How to Convey Your Merits In a Way That Earns Trust, Clients and Distinctions Just as no two individuals have the exact same face, no two lawyers practice in their respective fields or serve clients in the exact same way. Think of this as a "Unique Value Proposition." Internal consideration about what you uniquely bring to your clients, colleagues, firm and industry can provide untold benefits for your law practice.
    Read More ›
  • Risks and Ad Fraud Protection In Digital Advertising
    The ever-evolving digital marketing landscape, coupled with the industry-wide adoption of programmatic advertising, poses a significant threat to the effectiveness and integrity of digital advertising campaigns. This article explores various risks to digital advertising from pixel stuffing and ad stacking to domain spoofing and bots. It will also explore what should be done to ensure ad fraud protection and improve effectiveness.
    Read More ›