Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


Browse, Click, Sign, Enforce?
June 02, 2015
Signing, dating and keeping a record of a paper contract are standard practice ' but what about those that are native to websites, mobile apps and other digital platforms, and use such language as "Terms of Use," "Terms of Service," "Privacy Policies" and disclaimers? How do you track who is agreeing to what and when they agreed?
<b><i>Media & Communications:</i></b> Communicating Value in a Buyer's Market
June 02, 2015
It's easy to lose sight of purpose in a law firm ' especially as marketers. All the amazing opportunities "The Information Age" brings quickly deflate against the unresponsiveness or death-by-consensus model of law firm leadership. In these moments of defeat, the temptation to settle is strong. But we can help.
Digging into Data To Build a Vendor Management Program
June 02, 2015
For law departments, today's business environment is making it increasingly difficult to manage, control or reduce costs while being able to achieve satisfactory results. This is forcing companies to become more efficient in managing and controlling legal costs handled both internally by the organization and externally by outside counsel.
Bit Parts
May 29, 2015
Copyright Act Doesn't Bar Separate Attorney-Fee-Shifting Provision<br>No Federal Jurisdiction over Songs Suit
Counsel Concerns
May 29, 2015
Songwriter's Widow Sues His Lawyer<br>$275 Awarded to Activision From Settlement of Its Shareholders' Suit Against Former CEO
<b><i>Online Extra:</b></i> FTC Sued Over Refusal to Disclose Data Security Policies
May 28, 2015
' The Federal Trade Commission (FTC) was sued last month for refusing to turn over information about how the agency decides to bring data security cases. The Freedom of Information Act suit by Philip Reitinger, a former Department of Homeland Security official who is now president of a cybersecurity company, comes as the FTC'defends its role as data security cop'in two ongoing cases. &#133;
<b><i>Online Extra:</b></i> Data Breaches on Track to Cost Companies $2.1 Trillion
May 28, 2015
As more corporate infrastructure moves online, new research suggests the rising number and impact of data breaches will cost $2.1 trillion globally by 2019, almost four times the estimated cost of breaches in 2015.
Tips for How Women Lawyers Can Chart a Different Course
May 19, 2015
For all the chatter, studies, and disheartening stats we read on where Women in the Law rank in the legal services sector, I say 'phooey'. Yes, the numbers stink; yes, there are real barriers, discrimination, disappointing treatment from law firm leadership, but hey, we are women 'with a capitol W' as the phrase goes.
In the Courts
May 02, 2015
In-depth analysis of a case involving potential criminal liability under the AKS.
Business Crimes Hotline
May 02, 2015
A look at a key ruling of interest.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›