Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

The Computer Fraud and Abuse Act and Former Employees Image

The Computer Fraud and Abuse Act and Former Employees

Patricia Anderson Pryor

Laptops, thumb drives, data sticks, e-mails, and USB ports make it easy for employees to walk out of a company with valuable information, customer lists, and trade secrets. An employer's remedies are often limited.

Features

The Leasing Hotline Image

The Leasing Hotline

ALM Staff & Law Journal Newsletters

Recent rulings of interest to you and your practice.

Features

Common And Uncommon Assignment/Subletting Problems Image

Common And Uncommon Assignment/Subletting Problems

Ira Meislik

Part One of this article, which ran in the May 2009, issue of this newsletter, discussed the differences between assignment and subletting and assignments pro tanto. Part Two herein explores some of the problems that can arise in a transaction involving assignment or subletting.

Features

In the Spotlight: Commercial Tenant Considerations in a Troubled Economy Image

In the Spotlight: Commercial Tenant Considerations in a Troubled Economy

Glenn A. Browne

This article addresses certain terms, provisions and concerns that should be covered in a tenant's lease transaction, which will not only be important if the landlord experiences financial difficulties, but will also assist the tenant if it should confront a difficult financial situation on its own account.

Features

Trouble in Lease Land Image

Trouble in Lease Land

M. Rosie Rees

Part One of this article in last month's issue discussed a variety of methods to keep the tenant operating. The article herein continues the discussion.

On the Move Image

On the Move

ALM Staff & Law Journal Newsletters

Who's doing what; who's going where.

Chinese Manufacturers Image

Chinese Manufacturers

Simon Luk & Brian Lee

With the recent financial crisis that has affected many American importers, wholesalers, and retailers, Chinese manufacturers should be prepared to deal with financially distressed U.S. customers that seek to rehabilitate their businesses through Chapter 11 bankruptcy.

Seventh Circuit Vindicates Secured Lenders' Right to Full Payment Image

Seventh Circuit Vindicates Secured Lenders' Right to Full Payment

Michael L. Cook

The U.S. Court of Appeals for the Seventh Circuit held on May 5, 2009, that two secured lenders were fully secured, "entitled to a full recovery" from the debtor ("UAL") despite the bankruptcy court's improper valuation of the collateral (improved airport terminal space) securing the lenders' underlying $60 million loan.

Debt Exchange Offers in the Current Market Image

Debt Exchange Offers in the Current Market

Dennis F. Dunne & Brian P. Kelly

The recent financial crisis and dislocation in the financial markets has had significant consequences for bankruptcy and restructuring professionals. One such consequence is a dramatic increase in the use of debt exchange offers as a liability management tool.

Features

In re TS Tech: The Aftermath Image

In re TS Tech: The Aftermath

Vito J. DeBari & and Henry J. Cittone

While the Eastern District of Texas remains today one of the busiest patent litigation venues in the country, it is clear that <i>TS Tech</i> has led to an increase in the percentage of cases being transferred out of the EDTX and a significant decrease in the number of new patent cases being filed there.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Strategic Uses of a Rule 2004 Exam
    While most bankruptcy practitioners are familiar with the basic concepts behind the Rule 2004 exam, some are less familiar with the procedural intricacies of obtaining, conducting, and responding to the exam ' intricacies that often involve practices and procedures adapted from civil discovery that are beyond the scope of pure bankruptcy practice. This article explains.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›