Insurance for Data Security Breaches And Consumer Privacy Claims
Every other day we read about some new data security breach or proposal to regulate the use of consumer's private data. However, there is good news too: Most courts are intolerant of privacy claims brought by plaintiffs who have suffered no actual damage, and most companies have insurance for privacy claims without knowing it.
IP's Impact on M&A and Corporate Values
In this far-ranging interview, Susan Perng Pan, Washington, DC-based patent attorney and partner of the intellectual property firm SUGHRUE MION, PLLC, discusses best practices and strategies for in-house counsel to assess, protect, and evaluate the worth of their portfolios, both domestically and globally.
Quarterly State Compliance Review
This edition of the Quarterly State Compliance Review looks at legislation of interest to corporate lawyers that went into effect from May 1 through July 1. It also examines recent decisions of interest from the courts of Delaware, Texas, and Washington.
Features
Federal Courts Adopt Narrow Constructions of Sarbanes-Oxley Legislation
A look at recent Federal Court decisions interpreting section 304 and section 1514A(a)(1) of SOX. These rulings may provide insight into how Federal Courts will apply any broad powers granted by a looming round of legislation.
Features
Ex-Heller Employees Sue Former Partners
Former employees of Heller Ehrman sued at least 179 former partners in April, demanding they fork over $32 million for the largest group of creditors in the defunct firm's bankruptcy. This article discusses the suit.
Managing Stressed Employees in Difficult Economic Times
With an unemployment rate of 8.5% and an underemployment rate exceeding 14%, the workplace can be a very stressful environment. This article presents a discussion on how to manage these stressed employees.
Features
Law Firm Layoffs Trigger Need for Preventive Steps
Over the past several months, law firms have discharged both lawyers and staff in unprecedented numbers. Although it may be too early to assess whether these layoffs will result in significant legal fallout, law firms may make particularly attractive targets for lawsuits.
The Computer Fraud and Abuse Act and Former Employees
Laptops, thumb drives, data sticks, e-mails, and USB ports make it easy for employees to walk out of a company with valuable information, customer lists, and trade secrets. An employer's remedies are often limited.
Features
The Leasing Hotline
Recent rulings of interest to you and your practice.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- The Brave New World of Cybersecurity Due Diligence in Mergers and Acquisitions: Pitfalls and OpportunitiesLike poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- Digital Dibs: Rival Views of Generative AI CopyrightsGAI platforms like ChatGPT and OpenAI often require very little human input, shattering this legal landscape's framework by posing a simple question: Who authored the material? We'll explore how two countries are answering this question in different ways.Read More ›