Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

'Melendez/Bochner': No Guarantee the Guaranty Law Survives Constitutional Scrutiny Image

'Melendez/Bochner': No Guarantee the Guaranty Law Survives Constitutional Scrutiny

Claude G. Szyfer & Daria D. Anichkova

After nearly four years of litigation, the Second Circuit held recently that a small commercial landlord lacked standing to seek declaratory relief against the City of New York challenging the Guaranty Law under the Contracts Clause of the U.S. Constitution.

Features

Fifth Circuit Rejects Majority 'Independent Economic Value' Test for Infringement Damages Image

Fifth Circuit Rejects Majority 'Independent Economic Value' Test for Infringement Damages

Stan Soocher

Most of the federal circuit courts that have addressed what qualifies either as a "compilation" or as a single creative work apply an "independent economic value" analysis that looks at the market worth of the single creation as of the time when an infringement occurs. But in a recent ruling of first impression, the Fifth Circuit rejected the "independent economic value" test in determining which individual sound recordings are eligible for their own statutory awards and which are part of compilation.

Features

The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business Allies Image

The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business Allies

Yuliya LaRoe

Practical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.

Features

Authentic Communications Today Increase Success for Value-Driven Clients Image

Authentic Communications Today Increase Success for Value-Driven Clients

Leander Dolphin & Kent Nevins

As the relationship between in-house and outside counsel continues to evolve, lawyers must continue to foster a client-first mindset, offer business-focused solutions, and embrace technology that helps deliver work faster and more efficiently.

Features

Court Rules Mere Conduit Defense Not Suitable for a Motion to Dismiss Image

Court Rules Mere Conduit Defense Not Suitable for a Motion to Dismiss

Daniel A. Lowenthal

At the motion to dismiss stage, courts usually won't consider affirmative defenses. This issue arose recently in a preferential transfer case, where a defendant sought to dismiss a complaint by arguing it was a mere conduit, not an initial transferee.

Features

Individual Liability of Condominium Sponsor's Principals Image

Individual Liability of Condominium Sponsor's Principals

Stewart E. Sterk

When are the principals of a condominium sponsor individually liable for harms suffered by purchasers? In Board of Managers of 570 Broome Condominium, the First Department declined to dismiss a condominium board's fraud and breach of fiduciary claims against individual defendants.

Features

Compliance and Third-Party Risk Management Image

Compliance and Third-Party Risk Management

Chris Zohlen & Johnathan Prewitt

To gauge the level of risk and uncover potential gaps, compliance and privacy leaders should collaborate to consider how often they are monitoring third parties, what intelligence they are gathering with and about their partners and vendors, and whether their risk management practices have been diminished due to cost and resource constraints.

Features

Slight Decrease In Commercial Foreclosures Hints at Market Stabilization Image

Slight Decrease In Commercial Foreclosures Hints at Market Stabilization

Jose A. Herrera-Paez

While the commercial real estate market faced significant headwinds in 2024, recent data suggests that the tide may be turning. The combination of lower interest rates, a decline in foreclosures, and improving market conditions offers a glimmer of hope for property owners and investors alike.

Features

How Secure Is the AI System Your Law Firm Is Using? Image

How Secure Is the AI System Your Law Firm Is Using?

Melissa "Rogo" Rogozinski

In a profession where confidentiality is paramount, failing to address AI security concerns could have disastrous consequences. It is vital that law firms and those in related industries ask the right questions about AI security to protect their clients and their reputation.

Features

Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary Support Image

Pleading Importation: ITC Decisions Highlight Need for Adequate Evidentiary Support

Daniel Muino & Charles Provine

The International Trade Commission is empowered to block the importation into the United States of products that infringe U.S. intellectual property rights, In the past, the ITC generally instituted investigations without questioning the importation allegations in the complaint, however in several recent cases, the ITC declined to institute an investigation as to certain proposed respondents due to inadequate pleading of importation.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategic Uses of a Rule 2004 Exam
    While most bankruptcy practitioners are familiar with the basic concepts behind the Rule 2004 exam, some are less familiar with the procedural intricacies of obtaining, conducting, and responding to the exam ' intricacies that often involve practices and procedures adapted from civil discovery that are beyond the scope of pure bankruptcy practice. This article explains.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›