Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Commercial Law

Features

A Perfected Lien Is Trumped: Must It Be 'Use It or Lose It'? Image

A Perfected Lien Is Trumped: Must It Be 'Use It or Lose It'?

Barbara M. Goodstein

As creditors well know, a lien holder must be vigilant in both perfecting and maintaining the perfection and priority of its lien. But even a creditor that properly maintains its lien may find that enforcement of (or more specifically, failing to enforce) that lien can affect priority.

Columns & Departments

Drug & Device News Image

Drug & Device News

GAO Finds FDA's Safety Tracking System Lacking

Columns & Departments

Bit Parts Image

Bit Parts

Stan Soocher

Deactivated Facebook Page of Band Not a "Use in Commerce"<br>New York Federal Court Declines Request From Elvis Presley Enterprises To Obtain Royalty Documents From Sony Music for Litigation Against Arista Music in Germany

Features

The Cloud and e-Discovery Image

The Cloud and e-Discovery

David Greetham

Leveraging advanced technologies can empower corporate counsel and law firms alike to take control of the ongoing challenge that today's "information on demand" expectations present. When access, disaster recovery, scalability and security are paramount requirements, a migration to the cloud could be the most effective route to help ensure this is accomplished.

Features

10 Lessons from FTC Guidance on Data Security Image

10 Lessons from FTC Guidance on Data Security

Marc S. Roth

Not if, but when." These simple words are enough to keep privacy officers, corporate counsel, compliance officers and IT managers up at night when faced with the reality that their network will at some point be breached. While there are no silver bullets to stop breaches from occurring, understanding and following legal actions brought by regulatory agencies and heeding security guidance they issue can go a long way.

Features

Does Adoption of Cloud Computing Shift Cyber Liability Risk? Image

Does Adoption of Cloud Computing Shift Cyber Liability Risk?

Ted Sabety

The rapid adoption of cloud computing has attracted companies that seek to lower their information technology costs. At the same time, it is reported that there has been an increase in data loss and an increase in cyber-liability claims against companies. But the biggest vendors in the cloud computing industry want to push the risk of penetration of their systems onto their customers adopting the technology.

Features

When a Law Firm Partner Divorces Image

When a Law Firm Partner Divorces

Robert D. Boyd & Brooke M. French

Going through a divorce can be tumultuous for everyone involved. When one of the parties is a partner in a law firm, those challenges are sometimes elevated for both the partner and the law firm.

Features

Information Sharing for the Information Age Image

Information Sharing for the Information Age

David Burg, Sean Joyce & Michael L. Bloom

As 2015 drew to a close, Congress agreed on a federal budget. That simple act, coming on the heels of a series of contentious continuing resolutions, was big news. But tucked away on page 694 of that 887-page bill was perhaps a more significant achievement. There Congress inserted, passed, and the President signed, the Cybersecurity Act of 2015.

Features

Gossip Column Has No Special Protection From Defamation Suit Image

Gossip Column Has No Special Protection From Defamation Suit

Celia Ampel

Just because it's on "Page Six" of the <i>New York Post</i> doesn't mean it cannot be defamatory, according to the U.S. Court of Appeals for the Eleventh Circuit. The appellate court revived a defamation lawsuit by a member of The Fugees hip-hop group against the <i>Post</i> for an item in its "Page Six" gossip column, finding reasonable readers might take the story as true.

Features

CFPB Takes Step Into Cybersecurity Regulation Image

CFPB Takes Step Into Cybersecurity Regulation

C. Ryan Barber

The Consumer Financial Protection Bureau (CFPB) has fired a shot across the bow of the burgeoning online-payment industry, taking an enforcement action this week that marked the agency's first foray into regulating cybersecurity.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Litigating Redesigns At the ITC
    An overview of redesigns at the ITC, a discussion of the ITC's recent determination in Certain Audio Players and Controllers, and identifies some considerations to keep in mind when litigating redesigns at the ITC.
    Read More ›
  • Pros and Cons of Master Leases
    Section 365 of the Bankruptcy Code grants debtors the ability to assume or reject any executory contract or unexpired lease. Debtors must assume or reject a lease in its entirety and are not free under Section 365 to assume only favorable provisions of a lease. Courts, however, have consistently held that they will not find a multi-property master lease to be a unitary lease merely because such properties are demised in a single document.
    Read More ›