Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


Landlord Harassment of Commercial Tenants<font="-1"><b><i>What Can Be Done?</b></i></font>
March 02, 2017
<b><i>Part One of a Two-Part Article</b></i><br>Landlord harassment of tenants is a common problem, not only in the housing arena, but also in the commercial leasing sector. Certainly, landlords often have good reasons to be angry with their tenants. However, a landlord that resorts to bullying tactics does so at its own risk.
Employment Law Issues in PA's Medical Marijuana Act
March 02, 2017
The Medical Marijuana Act (MMA) puts Pennsylvania among the growing number of states permitting the use of marijuana for prescribed medicinal purposes. The MMA, like all state laws purporting to "legalize" marijuana use, squarely conflicts with federal law, which still considers marijuana to be a Schedule 1 substance under the Controlled Substances Act, with no legitimate medical uses.
Cyber Spies: In-House Legal Fights Back Against Cyberespionage
March 02, 2017
<b><i>An Exploration of the Modern Cyberespionage Threat and How In-House Legal Departments Are Fighting Back</b></i><p>Though faced with limited legal remedies, counsel are coming up with creative new ways to go after cyberespionage actors, and partnering with an array of cyber professionals and government agencies to combat the threat.
Chapter 13<br><b><i><font="-1">Best Practices in Credit Reporting</b></i></font>
March 02, 2017
There is a new trend emerging in FCRA litigation involving Chapter 13 bankruptcy, under which debtors propose a repayment plan to make installment payments to creditors over three to five years. Increasingly, plaintiffs are filing suit based on certain credit-reporting actions taken (or not taken) during a pending Chapter 13 bankruptcy case, after plan confirmation but prior to the entry of the discharge — when a debtor has met all requirements set by the court.
Application of Bankruptcy Law to Internet Assets
March 02, 2017
Internet assets generally, and Internet asset licenses in particular, are increasingly subject to bankruptcy proceedings.
The 'Soft Underbelly' of Cybersecurity Meets Legal Ethics
March 02, 2017
Legal departments for business organizations rate cybersecurity, regulation and ethics compliance among their chief concerns, and they are well aware of surveys showing law firms to be the "soft underbelly" of business security due to weakness of their cybersecurity.
Where Does Judge Gorsuch Fall on IP?
March 02, 2017
<b><i>The SCOTUS Nominee's Opinions Don't Appear to Favor Alleged Intellectual Property Infringers or Owners</b></i><br>Over the 10 years that he has served on the U.S. Court of Appeals for the Tenth Circuit, Gorsuch's decisions in intellectual property disputes have reflected a close attention to statutory text and a preference for narrow results that hew closely to precedent.
What Constitutes 'Proper' Notice?
March 02, 2017
Proper notice is a hallmark of all bankruptcy proceedings. If a creditor or party-in-interest has no notice of a particular matter, many courts have ruled that the creditor or party-in-interest will not be bound by a particular court's determination.
Landlord Solutions For Avoiding Uncertainty
March 02, 2017
<b><i>Key Considerations When Negotiating Personal Guarantees to Commercial Real Estate Leases</b></i><br>In today's commercial real estate market, uncertainty is about the only real thing that is certain. In this period of flux, where landlords no longer enjoy the same position of strength and leverage they once had over prospective tenants, it is critical to try and negotiate independent guarantees that best suit each particular deal and (hopefully) hedge against the downside of a potential tenant default and resulting litigation.
Data Breaches by Employees<br><b><i><font="-1">How to Keep Your Company Out of the Headlines</b></i></font>
March 02, 2017
The more we understand about how data breach incidents originate and propagate, the more likely we are to shift focus from outsider hackers to insider (employee) threats. Insider threats can be malicious, but often they are accidental.

MOST POPULAR STORIES