Obtaining Evidence from Social Networking Sites
If an attorney (or his or her agent) uses trickery to gain access to data that the owner allows only certain people to see, the ethical line will be crossed. Ultimately, if an attorney suspects that private data could be useful to the litigation of a family issue, court intervention should be sought.
Creating a Catalyst For Change
Like many other companies, Rockwell Automation wanted to become more cost-efficient, have the capability to perform benchmarking, make the best staffing decisions and serve our business proactively by providing legal advice that helps lower and manage the company's risks. However, our inability to monitor and report on our outside counsel spending was holding us back from meeting these goals.
Collaborative Prenuptial and Postnuptial Agreements
Two exploding areas in matrimonial law are converging: collaborative law and prenuptial/postnuptial agreements.
Features
The Benefits of a Next Generation Database Platform
Data processing tools have evolved and are now well suited for use in law firms to prepare electronic data for use with these Web applications. Law firms that implement these new applications are well positioned to significantly improve efficiency, better serve their clients and dramatically reduce costs.
Features
Integration In the Cloud
One of the greatest challenges any organization can face is the integration of evolving technology into its culture, practice and processes. At Bradford & Barthel ("B&B"), our main challenges in this regard have focused on the adaptation of Google Apps within our environment and business model.
Valuations of Interests in Private Equity and Hedge Funds
What are these components of value, and how can we decipher and work with them in the context of a divorce in the State of New York?
Features
Drug & Device News
News of importance to you and your practice.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- The Anti-Assignment Override ProvisionsUCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?Read More ›