Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

The Confounding Paradox of Marketing Investment for Struggling Law Firms Image

The Confounding Paradox of Marketing Investment for Struggling Law Firms

Bill Josten

“You have to spend money to make money.” Or, so holds the well-worn cliché. Nevertheless, for those firms struggling to find meaningful growth in today's market, where do they find the funds they need to spend in order to spur growth?

Features

Eighth Circuit Rejects Ponzi Scheme Presumption to Protect Legitimate Loan Repayments Image

Eighth Circuit Rejects Ponzi Scheme Presumption to Protect Legitimate Loan Repayments

Michael L. Cook

The Eighth Circuit affirmed the lower courts' dismissal of a bankruptcy trustee's $250 million fraudulent transfer suit against two banks (the Banks), rejecting the so called “Ponzi scheme presumption” that “allows a creditor to by-pass the proof requirements of a fraudulent-transfer claim by showing that the debtor operated a Ponzi scheme and transferred assets 'in furtherance of the scheme.'”

Columns & Departments

Bit Parts

Stan Soocher

Complaints to Amazon by TV Show Host and His Attorney Didn't Constitute DMCA Notices<br>No Actual Malice by Defendants in Libel Suit over Composite Character in Film

Columns & Departments

IP News

Jeff Ginsberg & Hui Li

Obviousness-Type Double Patenting Does Not Invalidate Section 156 Patent Term Extension <br>Federal Circuit Holds Assignor Estoppel Does Not Apply in IPR Context<br>Federal Circuit Reverses District Court Holding of Patent Ineligibility of Computer Security Patent

Features

A Chief Client Service Officer in Action Image

A Chief Client Service Officer in Action

Kimberly Rice

<i>Marketing the Law Firm</i> recently interviewed Jennifer Papantonio, Chief Client Service Officer of Peckar &amp; Abramson about her significant role, which includes the successes she and the firm have achieved in recent years, how she works collaboratively with firm leadership to create innovative solutions, and her recommendations to law firms which may be considering engaging a Chief Client Officer.

Features

Sticking a Hand in the Internet Cookie Jar Image

Sticking a Hand in the Internet Cookie Jar

Jeffrey Higel, Michael Bahar & Mike Nelson

Why Collecting Children's Online Data is a Risk As convenient, useful and cool mobile technology and interconnected devices are, they come with risks that remain largely unseen or, worse, ignored. For manufacturers, they also pose regulatory litigation, and insurance risks, especially when children end up using their "smart" products.

Features

Are You Prepared? Dealing with GDPR-like Rules Spreading Across the Nation Image

Are You Prepared? Dealing with GDPR-like Rules Spreading Across the Nation

Mark Sangster

California's Consumer Privacy Act, signed into law earlier this year, follows a growing line of consumer privacy laws, such as the European General Data Protection Regulations (GDPR), Canadian Breach of Security Safeguards Regulations of the Personal Information Protection and Electronic Documents Act (PIPEDA), and related New York Department of Financial Services Cybersecurity Rules and Regulations (NYCRR 500).

Features

Right Out of the Box: California Enacts First-of-its-Kind Statute Regulating Internet-of-Things Image

Right Out of the Box: California Enacts First-of-its-Kind Statute Regulating Internet-of-Things

Michael Bahar, Frank Nolan & Trevor Satnick

<b><i>Companies Impacted By California's SB-327 — Especially Manufacturers and Distributors of IoT Devices — Should Work to Ensure Compliance With the Act As Soon As Possible If Regulatory Fallout Is to Be Avoided Come January 2020</b></i><p>While a great deal of attention has focused on the California Consumer Privacy Act, California also passed a less-publicized, but highly critical, statute that will regulate certain aspects of Internet of Things device security.

Features

How Legal Teams Can Leverage AI Image

How Legal Teams Can Leverage AI

Rebecca Yoder

Artificial intelligence and automation are creeping into the workplace of every industry, bringing the added benefits of efficiency and security. As more organizations implement AI solutions across their departments, businesses still relying on outdated, manual processes will fall behind.

Features

The Blockchain Can Finally Secure Supply Chains Against Cyberattacks Image

The Blockchain Can Finally Secure Supply Chains Against Cyberattacks

Adrian Clarke

Cyber criminals looking for new ways to exploit company networks are turning their focus to the privileged network access given to the many players involved in supply chains. As supply ecosystems grow, and points of vulnerability proliferate, businesses will have to turn to distributed ledger technology.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES