Features
In the Spotlight: Subleasing Benefits and Risks
Significant amounts of office space are now becoming available for subleasing as prime tenants seek subrent income to help cover their prime rent obligations to their landlord. Here's a look at the pluses and minuses of subleasing.
A New Use for an Old Tool
Commercial leasing litigation has become an art form ' and in states like New York, attorneys have, as a result of technicalities such as failing to serve the tenant properly, kept non-paying tenants in possession for years.
Features
Prognostication Is a Mug's Game
What are reasonable assumptions about the future of the legal profession in this dynamic society? Here, we can surmise ' if not predict ' a future by extrapolating two things from the past.
Lessons from Twitter's Settlement with the FTC
The announcement that social-networking phenomenon Twitter has agreed to settle FTC charges that it had engaged in inadequate privacy and information security practices illustrates some simple mistakes that social media and other online companies can make. If the consent decree is approved, Twitter will have to live with the oversight that accompanies an FTC consent decree for 20 years (or more than four times the length of time that the company has existed).
Features
The Brave New World Of e-Workplace Privacy Policies
Part One of this article, last month, examined the liability involved with social media and e-mail use. Part Two discusses implementing compliant and defensible workplace policies.
Features
Crowdsourcing the Law
The Internet's completely over, the musician once-again known as Prince declared this summer. If so, I am at a loss to explain the ongoing emergence of innovative Web sites such as Spindle Law, a new site that is reconfiguring the traditional legal treatise to make it better fit a "Web 2.0" world.
Features
Navigating the Changing Technological Landscape
In <i>City of Ontario v. Quon</i>, the U.S. Supreme Court held that a government employer's search of an employee's communications on an employer-issued pager was reasonable under the circumstances and, therefore, did not violate the Fourth Amendment of the Constitution. The Court's narrowly tailored decision underscores that cases in the area of employee privacy will continue to be highly fact-sensitive.
Features
Client Speak: Client Feedback ' The 12 Essential Steps
This article ' in two parts ' will deal with the Client Feedback process, specifically the 12 essential steps involved. This first part lists the 12 steps and then describes steps 1 through 4a (pre-interview planning).
Career Journal: Possession Is Not Nine-Tenths of the Law
Even if law firms have made no changes to their existing structure, partners have done little lately to bolster the cause of their marketing organizations.
ERM 2.0 ' What's Next for Legal Marketers
Enterprise Relationship Management (ERM) is what firms today use to track and manage their relationships to determine which connections firm-wide can be valuable in growing their business. But ERM, like most marketing technologies, has evolved.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- UCC ' 1-203: A Few Lesser (and Not Always Lessor) Known PitfallsThis article discussed the unexpected (and, for a lessor, sometimes unfortunate) consequences that can result by not understanding all the nuances of UCC ' 1-203.Read More ›
- Players On the MoveA look at moves among attorneys, law firms, companies and other players in entertainment law.Read More ›