Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


Financing and Leasing Technology Is a Strategic Advantage
May 01, 2017
Advances in technology and software are being made at an increasingly rapid pace. As a result, IT hardware obsolescence cycles are shrinking too. This period of exponential improvement with which we are all now familiar has shown time and again that there will continue to be breakthroughs in technology that deliver better, less expensive, and/or more robust products. How are you equipping your firm to succeed both in the present day and into the future?
Would <b><i>Jevic</i></b> Have Come Out Differently with Gorsuch?
May 01, 2017
In <I>Jevic</I>, the members of SCOTUS — sans Neil Gorsuch, who had not yet been confirmed — declined the invitation to "upend" the absolute priority scheme. The question presented: "Can a bankruptcy court approve a structured dismissal that provides for distributions that do not follow ordinary priority rules without the affected creditors' consent?" SCOTUS's answer: a resounding "No." Would Gorsuch have changed that?
Using Computer Forensics to Investigate Employee Data Theft
April 02, 2017
When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft-of-IP analysis in order to preserve electronic data and uncover important evidence.
State of the Industry: e-Discovery and Cybersecurity
April 02, 2017
<b><i>Part One of a Three-Part Article</b></i><p>There are stark differences between e-discovery and cybersecurity, most notably that cybersecurity, as an avenue of career opportunity and responsibility, is much, much bigger. An examination of the current state of both industries coupled with a deep dive into the history of e-discovery will offer a prophetic look at the likely hiring patterns, job availability, compensation trends, and industry maturation of the cybersecurity vertical over the next decade.
Got a Negative Online Review? First Things First: Turn Off Your Attorney
April 02, 2017
It happened. Some current or former client had the gall to write something less than flattering about you online. What do you do? The first thing to do, and this can be the hardest thing for attorneys, is to turn off your attorney. Feedback can be hard to take.
Are Pharmacy Benefit Managers' Cost-Containment Claims a Shell Game?
April 02, 2017
In today's political climate, one of the hottest topics is the rising cost of healthcare and drugs. Following the last election, all industries should anticipate change, especially in healthcare. While much of the focus is currently on whether the Affordable Care Act will be repealed, one of the areas the government continues to scrutinize is costs.
<i>Decision of Note</i><br>Suit Seeking Public Doman Status for 'Buck Rogers' Can Move Forward
April 02, 2017
Team Angry Filmworks' lawsuit seeking public domain status for science fiction hero "Buck Rogers" adventures is set to blast off now that the U.S. District Court for the Western District of Pennsylvania denied a request to dismiss filed by the trust that licenses Rogers material.
Information Governance: Law Firms' Cybersecurity Weak Spot
April 02, 2017
Perimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.
Survey Reflects Growth in How Corporations Manage and Protect Information
April 02, 2017
Many organizations are changing their approach to leveraging cybersecurity intelligence through enhanced cooperation, detailed information sharing, and broad-based collaboration. To characterize those shifts and offer perspectives that empower effective benchmarking, for the third consecutive year, Nuix engaged my firm to interview corporate security officials. The report reflects the perspectives of 29 cybersecurity executives across a range of industries.
Institutional Deliberate Indifference
April 02, 2017
<b><i>When a Prisoner's Health Care Is Botched, the Providers' Employer May Be on the Hook</b></i><p>Prisoner Eighth Amendment allegations of cruel and unusual punishment due to deliberate indifference to their medical needs are common; most of them go nowhere. Once in a while, though, the care provided to a prisoner is so substandard that the case actually hurdles the defendants' motion for summary judgment and makes it to trial.

MOST POPULAR STORIES

  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • What Not to Do in a Hostile Work Environment Case
    A recent decision, <i>Boggs v. Die Fliedermaus, d/b/a Le Bar Bat</i>, 2003 WL 22299315 (S.D.N.Y. 10/07/03) (Sweet, D. J.), offers many lessons for employers about what to do, and not to do, to position themselves for a successful summary judgment motion in a hostile work environment case.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›