Account

Sign in to access your account and subscription

LJN Newsletters

  • Lease Assignee Can Make Claim that Appears to Concern Only Property's Owners

    August 01, 2018ljnstaff
  • Federal Circuit Holds That Tribal Sovereign Immunity Cannot Be Asserted in IPR Proceedings
    Citing 'Steep Burden' on Plaintiffs, Federal Circuit Denies Use of 'Entire Market Value Rule' in Cases Involving Multicomponent Products

    August 01, 2018Howard Shire and Adam Fisher
  • Unaoil Charged with Corruption by SFO

    August 01, 2018Colleen Snow
  • Many community hospitals are in distress. The causes are varied but have a constant theme — the cost to adapt to a rapidly changing environment.

    August 01, 2018Deborah Williamson, Mark Andrews and Richard Y. Cheng
  • While many business owners and executives understand that a data security problem/need exists, they do not have a baseline fluency in the concepts and alphabet soup that comprise the language of digital information security. To this extent, Chris Moschovitis' new book is an effective cybersecurity primer for the management community.

    August 01, 2018Adam Schlagman
  • Cryptocollectible Concept Denied Trade Secret Protection
    Jefferson Starship Co-Founder Loses Anti-SLAPP Motion Against Current Members of Band

    August 01, 2018Stan Soocher
  • In a nutshell, GDPR mandates that individuals have access and control over the use and maintenance of their data in certain circumstances, while the foundation of blockchain relies on the immutability of data. On the surface, these concepts seem in direct conflict with each other. This article discusses the points where GDPR and blockchain share common ground, where conflicts may exist and possible approaches for mitigating those conflicts.

    July 01, 2018Justin Hectus and Kristy Sambor
  • At both a personal and corporate level, there are huge gains to be made in protecting against data breaches. The fact is that well-implemented client-side encryption — where the corporate user keeps their own key rather than entrusting a third party to guard their sensitive information — is the only sure way to guarantee data privacy when storing data on other people's servers.

    July 01, 2018Linus Chang
  • Part Two of a Two-Part Article

    In Part One of this article last month, we began a discussion designed to demystify the hesitations behind cloud security and analyzed the fast-growing transformation to a range of newer technical approaches with important consequences for legal practice. This month we continue the discussion by tackling the security and legal implications of the mass transformation of enterprise IT to cloud services from leading providers such as AWS and Azure.

    July 01, 2018Adam Cohen