Account

Sign in to access your account and subscription

LJN Newsletters

  • A recent trend in the human resources community is to ask prospective employees for usernames and passwords to social media sites to allow the hiring employer access to otherwise private information about an employment candidate's "online identity." e-Commerce companies, even though they are based on and operate through online activities, sometimes through social media, should carefully consider what principals and hiring parties in the firms may view as a natural inclination to examine an applicant's or an employee's social media postings and persona by demanding access to the sites.

    May 29, 2012Steven W. Suflas and Mary Cate Gordon
  • The thought that people do not need to be engaged or motivated when faced with new information is based on the mythology that assumes that we can just pour facts into the passive minds of our judges, and they will automatically and somehow "get it.

    May 29, 2012Curtis J. Romanowski
  • Much virtual ink has been spilled about the complexities of applying traditional copyright law to e-commerce (and the Internet, generally). The intersection of law developed for the written word on paper, and tangible objects, and digital distribution of their modern equivalents, remains a work in progress, to say the least.

    May 29, 2012Stanley P. Jaskiewicz
  • Is it permissible for a judge to become friends on a social media site with lawyers who appear before the judge? The comments to the rule do not address the issue, and there is disagreement among ethics committees in the various states with respect to this specific question.

    May 29, 2012William R. Wright
  • Highlights of the latest equipment leasing news from around the country.

    May 29, 2012ALM Staff | Law Journal Newsletters |
  • When a lawsuit is settled, the clients cut a deal, the legal gladiators lay down their briefs, and everyone breathes a sigh of relief. But is that sigh premature?

    May 29, 2012Bruce Ericson and Frederick Brodie
  • Risk mitigation requires a good understanding of where the vulnerabilities are, and one that many companies have missed is the sensitive data that likely reside in the hard drive memories of printers, copiers, and fax machines.

    May 29, 2012L. Elise Dieterich
  • After the February FASB/IASB Lease Accounting Project meetings,the Boards added a fourth approach that the ELFA has been recommending from the start of the Lease Project.

    May 29, 2012Bill Bosco