Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Best Practices in Second Request Document Review: How to Execute An E-discovery-Based Plan Image

Best Practices in Second Request Document Review: How to Execute An E-discovery-Based Plan

Jessica Robinson & Amit Dungarani

Part 2 of a Two-Part Article Part 1 of this article discussed approaches to managing second requests using core project management principles that allow you to control the timeliness, cost, and quality of your organization's response. This follow-up looks at the pragmatics of strategizing and executing a successful plan.

Features

The Increasing Challenges of Verification on Social Media Image

The Increasing Challenges of Verification on Social Media

Christine Au-Yeung & Chidera Dawodu

The recent flurry of online impersonators, ranging from accounts posing as President Joe Biden to the pharmaceutical company Eli Lilly, exposes the challenges of social media platforms' verification and authentication processes. These events show that monitoring and policing trademark infringements and right of publicity violations can be increasingly difficult in the social media context.

Features

Successful Hybrid Plans Offer 'Best of Both Worlds' Image

Successful Hybrid Plans Offer 'Best of Both Worlds'

Anthony Davies

We're seeing is a variety of successful measures that are designed to help attorneys get what they want: a best-of-both worlds scenario where they keep some work-from-home and fold-in an opportunity to intentionally connect and collaborate with colleagues in the office.

Features

The Future of AI Is More Ironman than Terminator Image

The Future of AI Is More Ironman than Terminator

Cat Casey

Many fear cyborgs stealing corner offices from rainmakers, that the future will be Robolawyers instead of humans. The reality is that the most powerful AI today, when applied to complex areas like legal, is more reliant on human interaction, not less.

Features

U.S. Supreme Court Will Hear Political Football Section 230 Case — Why This One? Image

U.S. Supreme Court Will Hear Political Football Section 230 Case — Why This One?

Bruce Heiman

The Supreme Court has decided in the context of national security to consider the parameters of, and possible limits to, "Section 230" liability protections for social media companies. The question is why this case? The Supreme Court has decided to accept a case that, while sounding narrow and technical, actually goes to the heart of the way many Internet platforms operate — algorithmic targeted content recommendations.

Features

Legal Tech: The Attorney-Client Privilege Purpose Requirement and E-Discovery Image

Legal Tech: The Attorney-Client Privilege Purpose Requirement and E-Discovery

Kelly Lavelle

On Jan. 9, the U.S. Supreme Court heard oral argument on whether the attorney-client privilege protects against disclosure of dual-purpose communications — where the communications contain both legal and nonlegal advice.

Columns & Departments

Live Webinar: The Crypto Landscape Post-FTX Image

Live Webinar: The Crypto Landscape Post-FTX

CLS Staff

On Feb. 15 at 4 p.m. ET, Cybersecurity Law & Strategy will present a complimentary live webinar titled "The Crypto Landscape Post-FTX." The presentation will cover the current status and near-future outlook for the blockchain (crypto) sector.

Columns & Departments

Development Image

Development

NYRE Staff

Invalid Condition on Special Permit Does Not Invalidate Permit Landmark Commission's Certificate of Appropriateness Upheld Area Variances Upheld Negative Declaration on Zoning Amendment Upheld BSA Misconstrued Curb Level Provision In Zoning Resolution

Features

How Much Deference to Public Use Determinations? Image

How Much Deference to Public Use Determinations?

Stewart E. Sterk

How closely will New York courts scrutinize exercises of the eminent domain power? Until recently, courts have been quite deferential when entities clothed with eminent domain power have determined that private property is necessary for public use. Two recent decisions, however, suggest that there are limits to that deference.

Columns & Departments

Real Property Law Image

Real Property Law

NYRE Staff

Tax Deed Invalid for Inadequate Notice Mistaken Description In Foreclosure Action on Neighboring Parcel Does Not Affect Landowner's Parcel

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Inferring Dishonesty: The Fifth Amendment and Fidelity Coverage
    Dishonest employees always have posed a problem for businesses. The average business may lose 6% of its annual revenues to employee fraud, and cumulatively the impact of employee theft on the economy is estimated to be $600 billion annually. <i>See</i> Association of Certified Fraud Examiners ("ACFE"), 2002 Report to the Nation on Occupational Fraud &amp; Abuse, at ii, 4 (2002), available at <i>www.cfenet.com/publications/rttn.asp.</i> Although the average loss through employee embezzlement is $25,000, where computerized financial records or transactions are involved, the average loss increases nearly twentyfold. <i>See</i> National White Collar Crime Center, <i>WCC Issue: Embezzlement/Employee Theft,</i> at 2 (2002), available at <i>http://nw3c.org/downloads/Computer_Crime_Weapon.pdf.</i>
    Read More ›
  • The Anti-Assignment Override Provisions
    UCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?
    Read More ›