Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Media & Communications Corner: A Profile of Terri Mottershead, Director of Professional Development, DLA Piper Image

Media & Communications Corner: A Profile of Terri Mottershead, Director of Professional Development, DLA Piper

Kim Proxmire

Since joining DLA Piper five months ago, Terri Mottershead has worked to significantly expand the firm's professional development program to serve as a resource not only to the firm's attorneys, but also to its clients.

The Threat of Evidence Destruction Image

The Threat of Evidence Destruction

James W. Soong & Y.T. Chen

<i>Part One of a Two-Part Article</i><p>In high-technology disputes, a patentee must secure a thorough understanding of often complex and subtle technologies in accused devices to prove patent infringement. Despite a patentee's best efforts to obtain proof of infringement, very often the most convincing evidence of patent infringement ' for example, proprietary design documents of the accused device ' lies within the possession of the alleged infringer itself.

Features

Career Journal: Greater Impact -- Deciding Between an In-House or a Freelance Marketing Role Image

Career Journal: Greater Impact -- Deciding Between an In-House or a Freelance Marketing Role

Michael DeCosta

With the average tenure of a law firm Chief Marketing Officer hovering around three years, business development and marketing executives might wonder if the profession offers a healthy career platform for them long term. Here's what they need to know.

Networking Success for the Single Attorney Image

Networking Success for the Single Attorney

Christy Burke

Many single and divorced people are savoring their unmarried lifestyles, and are leveraging the freedom of being unattached to creatively develop their business networks. Here's how they do it.

Real Property Law Image

Real Property Law

ALM Staff & Law Journal Newsletters

Analysis of recent rulings.

Eminent Domain Law Image

Eminent Domain Law

ALM Staff & Law Journal Newsletters

A recent important case.

Features

Development Image

Development

ALM Staff & Law Journal Newsletters

A look at recent rulings of importance.

Index Image

Index

ALM Staff & Law Journal Newsletters

Everything contained in this issue, in an easy-to-read format.

Features

Movers & Shakers Image

Movers & Shakers

ALM Staff & Law Journal Newsletters

Who's doing what; who's going where.

Drug & Device News Image

Drug & Device News

ALM Staff & Law Journal Newsletters

The latest news in this important area.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Inferring Dishonesty: The Fifth Amendment and Fidelity Coverage
    Dishonest employees always have posed a problem for businesses. The average business may lose 6% of its annual revenues to employee fraud, and cumulatively the impact of employee theft on the economy is estimated to be $600 billion annually. <i>See</i> Association of Certified Fraud Examiners ("ACFE"), 2002 Report to the Nation on Occupational Fraud &amp; Abuse, at ii, 4 (2002), available at <i>www.cfenet.com/publications/rttn.asp.</i> Although the average loss through employee embezzlement is $25,000, where computerized financial records or transactions are involved, the average loss increases nearly twentyfold. <i>See</i> National White Collar Crime Center, <i>WCC Issue: Embezzlement/Employee Theft,</i> at 2 (2002), available at <i>http://nw3c.org/downloads/Computer_Crime_Weapon.pdf.</i>
    Read More ›