Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
It is common, and in many cases absolutely necessary, for an employer to provide a laptop to its workers. Twenty years ago, virtually no one had a “portable” computer. Where a filing cabinet or a desk drawer would have been the repository for correspondence 20 years ago, the correspondence now resides on a server, or on a PC or a laptop hard drive. Text and voice messages are also sent through a PC or a handheld device or a telephone. A telephone would not have stored a message, at least not for very long, whereas now the numbers that have been called and received, as well as text and voice messages, can be recovered from the computer or laptop hard drive, if not the phone itself.
As recent litigation has demonstrated, the use of new communications devices with new capabilities is having an effect on how attorneys and their clients communicate, and, therefore, is raising issues in attorney-client privilege.
There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
In recent years, there has been a growing number of dry cleaners claiming to be "organic," "green," or "eco-friendly." While that may be true with respect to some, many dry cleaners continue to use a cleaning method involving the use of a solvent called perchloroethylene, commonly known as perc. And, there seems to be an increasing number of lawsuits stemming from environmental problems associated with historic dry cleaning operations utilizing this chemical.
In Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?
This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.