The Most Liquid Assets
This article is the third installment in an ongoing series focusing on accounting and financial matters for corporate counsel.
Your Social Media Policies May Violate the NLRA
Employer policies and practices on employees' use of social media continues to be a hot topic for the National Labor Relations Board. Here's what you need to know.
Features
Quarterly State Compliance Review
This edition of the Quarterly State Compliance Review looks at some enacted and pending legislation of interest to corporate lawyers. It also analyzes some recent cases of interest, including two decisions from the Delaware Chancery Court.
Features
Legislative Update: EU Issues New Data Protection Proposals
Much as was anticipated, the European Commission recently announced its long-awaited proposals on what are likely to be viewed as drastic changes to data protection law in Europe.
Features
Secured Lender Invokes Seldom-Used Tool to Protect Collateral in Bankruptcy
In a Chapter 11 bankruptcy process,the question becomes: Who will take the loss on their balance sheet ' the lender or the borrower? An analysis of recent litigation.
Features
Public Corruption Prosecutions in New York
This article focuses on the example of New York State and the prosecution of public corruption offenses under that state's law. A case in point is the recent prosecution of former New York State comptroller Alan Hevesi, in which then Attorney General Andrew Cuomo effectively used a statute other than bribery to prosecute public corruption.
Use of the Travel Act to Prosecute Foreign Commercial Bribery
In last month's issue, the authors reviewed the ongoing case, <i>United States v. Carson</i>, in which the government charged the defendants with violating the Travel Act. The discussion continues herein.
Jurors, Internet Research and Social Media
Jurors' use of the Internet to conduct improper trial-related research or to communicate about the trial's progress, the evidence, or the jury's deliberations has been the subject of articles in practically every bar publication that includes litigators among its target audience.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- A 'Cloud Security Doctrine' for Law FirmsCloud computing may be here to stay, but is it truly safer than the solutions that it's outmoding? The Legal Cloud Computing Association (LCCA) thinks there's a path to greater security, publishing for law firms its first "Cloud Security Doctrine."Read More ›
- Artist Challenges Copyright Office Refusal to Register Award-Winning AI-Assisted WorkCopyright law has long struggled to keep pace with advances in technology, and the debate around the copyrightability of AI-assisted works is no exception. At issue is the human authorship requirement: the principle that a work must have a human author to be eligible for copyright protection. While the Copyright Office has previously cited this "bedrock requirement of copyright" to reject registrations, recent decisions have focused on the role of human authorship in the context of AI.Read More ›
- IP NewsFederal Circuit: PTAB Did Not Err In Finding That It Retained Authority to Issue Final Written Decision After Deadline Passed Federal Circuit: District Court Did Not Err In Finding That an Abbreviated New Drug Application Is Limited to the Uses Described ThereinRead More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›