Features
Law Firms Need Artificial Intelligence to Stay in the Game
The Legal Department Is Savvier and Has More Options In the Form of ASPs and Legal Technology. It's Time for Law Firms to Embrace Change. AI Is a Key Ingredient In Doing So.
Columns & Departments
Case Notes
Lease Assignee Can Make Claim that Appears to Concern Only Property's Owners
Columns & Departments
IP News
Federal Circuit Holds That Tribal Sovereign Immunity Cannot Be Asserted in IPR Proceedings<br>Citing 'Steep Burden' on Plaintiffs, Federal Circuit Denies Use of 'Entire Market Value Rule' in Cases Involving Multicomponent Products
Features
Media & Communications: How to Make PR Simple, Convenient and Unintimidating for Lawyers
Top Tips for Public Relations Success in Law Firms
Features
Due Diligence in Distressed Community Hospitals
Many community hospitals are in distress. The causes are varied but have a constant theme — the cost to adapt to a rapidly changing environment.
Features
Book Review: Cybersecurity Program Development for Business: The Essential Planning Guide
While many business owners and executives understand that a data security problem/need exists, they do not have a baseline fluency in the concepts and alphabet soup that comprise the language of digital information security. To this extent, Chris Moschovitis' new book is an effective cybersecurity primer for the management community.
Columns & Departments
Bit Parts
Cryptocollectible Concept Denied Trade Secret Protection<br>Jefferson Starship Co-Founder Loses Anti-SLAPP Motion Against Current Members of Band
Features
Blockchain and GDPR — Frenemies?
In a nutshell, GDPR mandates that individuals have access and control over the use and maintenance of their data in certain circumstances, while the foundation of blockchain relies on the immutability of data. On the surface, these concepts seem in direct conflict with each other. This article discusses the points where GDPR and blockchain share common ground, where conflicts may exist and possible approaches for mitigating those conflicts.
Features
Why Encryption Is the Key to Ensure Data Privacy in the Cloud
At both a personal and corporate level, there are huge gains to be made in protecting against data breaches. The fact is that well-implemented client-side encryption — where the corporate user keeps their own key rather than entrusting a third party to guard their sensitive information — is the only sure way to guarantee data privacy when storing data on other people's servers.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- Supreme Court Asked to Assess Per Se Rule Tension in Criminal AntitrustIn recent years, practitioners have observed a tension between criminal enforcement of the broadly written terms of the Sherman Antitrust Act of 1890 and the modern Supreme Court's notions of statutory interpretation and due process in the criminal law context. A certiorari petition filed in late August in Sanchez et al. v. United States, asks the Supreme Court to address this tension, as embodied in the judge-made per se rule.Read More ›
- Restrictive Covenants Meet the Telecommunications Act of 1996Congress enacted the Telecommunications Act of 1996 to encourage development of telecommunications technologies, and in particular, to facilitate growth of the wireless telephone industry. The statute's provisions on pre-emption of state and local regulation have been frequently litigated. Last month, however, the Court of Appeals, in <i>Chambers v. Old Stone Hill Road Associates (see infra<i>, p. 7) faced an issue of first impression: Can neighboring landowners invoke private restrictive covenants to prevent construction of a cellular telephone tower? The court upheld the restrictive covenants, recognizing that the federal statute was designed to reduce state and local regulation of cell phone facilities, not to alter rights created by private agreement.Read More ›
