Features
Justice Department Issues Guidance on Discovery
In the wake of a high-profile case that highlighted discovery abuses by federal prosecutors, the Department of Justice (DOJ) issued guidance regarding the government's discovery obligations on Jan. 4, 2010.
Features
Feds to Corporate America: 'The Cops Are Coming'
On Jan. 19, the Department of Justice (DOJ) announced the arrest of 22 individuals as part of a "sting" operation aimed at uncovering violations of the Foreign Corrupt Practices Act (FCPA). As intended, the case got a great deal of publicity due to both the large number of individuals arrested and the manner in which the investigation was handled.
Sex Versus Society
In last month's newsletter, we began discussion of a decision from New York's Appellate Division, Second Department, in which the court concluded that the concept of constructive abandonment could not be extended to permit divorce due to social, rather than sexual, abandonment. The discussion concludes herein.
Military Retirement vs. Disability Pay
Even when a lawyer is aware of the complications that can arise, attempts to protect a civilian party's rights to a portion of a service member's retirement may go awry. Recent cases in Alaska and Texas illustrate the problems that attempts to work around the laws can cause.
Features
Case Briefs
Highlights of the latest insurance news from around the country.
The Alvord Decision: Why Periodic Review of Insurance Policies Is a Must for Franchisors
Franchisors, like other businesses, should periodically review their insurance policies to make certain that they understand the scope of their existing coverage and to identify (and remedy) any significant gaps in that coverage.
Features
Master of Your Domain Name
It's been a long time since the Internet was considered to be the sole province of computer technicians and young people. Today, it seems just about everyone is not only connected to the Internet but is using it to blog, to network or to host their own Web site. And that includes most law firms.
Negotiating Cloud Computing Agreements
Cloud computing has been characterized as a paradigm-shifting phenomenon that will change how we purchase IT resources. Though given different names, cloud computing has been around for some time, and the legal lessons learned from experience with traditional software licensing and outsourcing agreements can and should be applied to cloud agreements, but there are new issues which will need new solutions.
Lengthy Crimes, Limited Coverage: Recent Case Law Follows the 'One Policy Limit' Approach
The recent decisions in <i>Madison Materials</i>, <i>PBSJ</i>, and <i>Hartman & Tyner</i> provide further support for the majority view that coverage for a multi-year crime is limited to one policy period despite successive policies in effect during the crime.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Strategic Uses of a Rule 2004 ExamWhile most bankruptcy practitioners are familiar with the basic concepts behind the Rule 2004 exam, some are less familiar with the procedural intricacies of obtaining, conducting, and responding to the exam ' intricacies that often involve practices and procedures adapted from civil discovery that are beyond the scope of pure bankruptcy practice. This article explains.Read More ›
- COVID-19: Economic Stimulus and SBA LoansA summary of information on the various provisions under the new federal economic stimulus package.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›