Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Movers & Shakers Image

Movers & Shakers

ALM Staff & Law Journal Newsletters

News about lawyers and law firms in the commercial leasing industry.

The Leasing Hotline Image

The Leasing Hotline

ALM Staff & Law Journal Newsletters

Highlights of the latest commercial leasing cases from around the country.

Features

Subleasing Pointers: The Perspective of a Prime Landlord, Sublandlord, and Subtenant Image

Subleasing Pointers: The Perspective of a Prime Landlord, Sublandlord, and Subtenant

Alison Jones, Randy Luffman & Natosha O. Reid

This three-part article provides a pointers for the Prime Landlord, Sublandlord, and Subtenant to consider when negotiating provisions relating to subleasing.

Features

In the Spotlight: Things to Think About During Review of a Lease Image

In the Spotlight: Things to Think About During Review of a Lease

Paul Robeznieks

To review another party's form commercial retail lease adequately and completely, one must analyze all the attached exhibits. Do the exhibits to the lease either supplement the lease or potentially modify its terms and conditions. This article covers: 1) commencement date memorandum; 2) estoppel certificates; 3) exclusives and prohibited uses; and 4) rules and regulations.

Alienation of Tenants' Rights: Factors to Consider to Make a Ground Lease Financeable Image

Alienation of Tenants' Rights: Factors to Consider to Make a Ground Lease Financeable

Catherine L. Burns

This article suggests some tips to consider in the negotiation of the provisions of a ground lease that will be the center of attention for the leasehold mortgagee. These tips should help to smooth the way for the tenant's leasehold financing by an institutional mortgagee.

Harnessing Creativity or Creating Liability? Image

Harnessing Creativity or Creating Liability?

Alan L. Friel

The growth of online social networking has not been lost on marketers, who hope to enlist Internet users in campaigns to promote their products and services. This article will appear in three installments. This first part examines the use of user-generated content ('UGC') and user participation as part of a promotion.

Physical Data Security, Management and Destruction for Legal IT Professionals Image

Physical Data Security, Management and Destruction for Legal IT Professionals

Michael Chung

One of our major concerns has always been the security of our clients' sensitive data. Recently, there have been stories in the news about data media getting lost or exposed, often with damaging or embarrassing consequences. Backup tapes, hard drives, CDs and other sources contain exponentially more data than a box of paper, so we have had to become very focused on how these data storage devices are tracked, stored, managed and disposed of when the time comes. Now that storage is so inexpensive, more data is sitting on a single disk or drive. New terabyte disk drives are setting a new standard for capacity ' but they also send up a huge red flag for risk. What if one terabyte hard drive was to fall into the wrong hands? Imagine the fallout and liability to which a law firm could be vulnerable.

Features

Bundled Software Image

Bundled Software

Timothy M. Hansen

The offering of combined services and devices is a direct response to consumer demand for streamlined, one-stop, bundled convenience. Take me for instance: I held out for several months until my cell phone provider finally started selling Blackberries so I could get the e-mail push from work without having to carry two devices. This bundling concept is also emerging in the legal profession. Platforms such as LexisNexis Total Litigator and Westlaw Litigator, for example, which bundle services and features that previously had to be accessed independently, are rapidly gaining popularity. So, just how well does the bundling concept work?

Features

e-Discovery Techniques For Filtering Responsive Data Image

e-Discovery Techniques For Filtering Responsive Data

Brian Larsen

As most e-discovery vendors will happily tell you, 99% of all new business information is being created and stored electronically, and an estimated 60 billion e-mail messages are sent daily in the U.S. Sifting through all this data in a meaningful manner requires strategic thinking. On one hand, parties have an obligation ' and courts have created incentives ' to be fully forthcoming on electronic discovery requests. On the other hand, processing and reviewing data collected from hundreds of desktops and servers can become very expensive. During the e-discovery search process, even the most strategic keyword selections can leave a lot to be desired. Even case-specific terms may generate a lot of hits, but it may also produce more false positives than relevant material. Creating a strategic plan for data filtering through a well-researched selection of keywords and file types helps to ensure efficiencies in cost, time and resources, while generating fully forthcoming materials.

Data Mapping: The Common Thread Between Litigation Preparedness and Data Security Image

Data Mapping: The Common Thread Between Litigation Preparedness and Data Security

Wayne Wong

In today's world, most business activity creates electronically stored information ('ESI') ' whether it's an e-mail, document, voice-mail or database transaction ' and the exponentially increasing volume and diversity of those digital files at corporations represents exponentially increasing corporate risk. However, according to a survey of corporate counsel attorneys, only 7% of them rate their companies as prepared for the electronic discovery amendments to the FRCP. This lack of preparedness is not surprising since, until recently, many in-house legal departments have taken a back seat and let outside counsel manage their discovery needs.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›