Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Litigation

Features

Defamation and the Disgruntled Defendant Image

Defamation and the Disgruntled Defendant

Janice G. Inman

<b><I>Part One of a Two-Part Article</I></b><p>Analysis of a recent case in which a company, publicly accused by a plaintiff's lawyers of using non-FDA-approved medical devices, fought back by bringing a defamation suit against the opposing attorneys. The decision in the appeal offers some insights into what kinds of allegations may be publicized, and in what circumstances, when a product liability charge is brought.

Columns & Departments

Landlord & Tenant Image

Landlord & Tenant

ljnstaff & Law Journal Newsletters

A look at two interesting cases.

Features

Third-Party Litigation Funding Image

Third-Party Litigation Funding

Jonathan Friedland, Elizabeth Vandesteeg & Jeffrey Goldberg

Third-party litigation funding is a relatively new, but rapidly expanding litigation financing vehicle. According to the authors, general counsel and commercial litigators would be well served to understand the changing landscape regarding the scope and potential uses of such funding.

Features

Trade Secrets Litigation: The No-Longer-Forgotten Part of the Tech IP Arsenal Image

Trade Secrets Litigation: The No-Longer-Forgotten Part of the Tech IP Arsenal

Zach Warren

<b><i>With Massive Jury Rewards and the DTSA Encouraging Federal Litigation, Trade Secrets Litigation Is Seeing a Surge in the Tech Industry</b></i><p>These days, many of the big IP litigation battles involving companies like Facebook, Uber, and Epic, have nothing to do with patents, trademarks or copyrights at all. Instead, it's all about the perhaps forgotten part of IP: trade secrets.

Columns & Departments

Bit Parts Image

Bit Parts

Stan Soocher

Investment Firm Can Proceed Against Artist in Litigation Funding Dispute

Columns & Departments

In the Courts Image

In the Courts

ljnstaff & Law Journal Newsletters

A three-judge panel of the Second Circuit upheld the conviction of Mathew Martoma for insider trading and, in doing so, overruled part of <I>United States v. Newman</I>, thereby removing one obstacle for prosecutions of insider trading.

Columns & Departments

Development Image

Development

ljnstaff & Law Journal Newsletters

A look at a case in which, in a developer's article 78 proceeding challenging the town's denial of its application to rezone property, the town moved to dismiss.

Columns & Departments

Verdicts Image

Verdicts

ljnstaff & Law Journal Newsletters

In-depth analysis of two key rulings.

Columns & Departments

Case Notes Image

Case Notes

ljnstaff & Law Journal Newsletters

A look at a situation in which, because the drug-manufacturing defendants seeking federal retention of a case removed from state court were unable to prove the four elements of the U.S. Supreme Court's <I>Gunn</I> test for federal-question jurisdiction, the case was remanded back to state court.

Columns & Departments

Cooperatives & Condominiums Image

Cooperatives & Condominiums

ljnstaff & Law Journal Newsletters

Discussion of two major cases.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›