Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

<b><i>Online Extra</b></i><br> Google Sues to Block 'Repugnant' Canadian Court Decision Image

<b><i>Online Extra</b></i><br> Google Sues to Block 'Repugnant' Canadian Court Decision

Ben Hancock

Google Inc. has filed suit in U.S. federal court seeking to block enforcement of a decision by the Supreme Court of Canada that would require the search giant to delist certain search results worldwide.

Features

<b><i>Online Extra</i></b><br> Pokéstop: Judge Calls Timeout in Suit Against Pokémon Go Maker Image

<b><i>Online Extra</i></b><br> Pokéstop: Judge Calls Timeout in Suit Against Pokémon Go Maker

Ross Todd

A federal judge has pressed pause on a group of lawsuits targeting the maker of augmented reality game Pokémon Go with nuisance and trespass claims for placing virtual landmarks on top of real property.

Features

<b><i>Online Extra</i></b><br>Publishers Seek Antitrust Exemption to Better Negotiate With Google, Facebook Image

<b><i>Online Extra</i></b><br>Publishers Seek Antitrust Exemption to Better Negotiate With Google, Facebook

Todd Cunningham

U.S. newspaper publishers, who say they are chafing under the market power of Google and Facebook, are calling on Congress to allow them to negotiate collectively with the online giants.

Features

Third-Party Cybersecurity Strategies Critical to Preparedness Image

Third-Party Cybersecurity Strategies Critical to Preparedness

David F. Katz, Richard D. Smith, Elizabeth K. Hinson, Jason Mark Anderman & Sarah Statz

This article examines the guidelines published by Board of Governors of the Federal Reserve System on managing outsourcing risk, along with the Office of the Comptroller of the Currency (OCC) 2013 OCC Bulletin 2013-29 and the supplemental Jan. 24, 2017, examination procedures, which are designed to help bank examiners tailor the examinations of national banks and federal savings associations determine the scope of the third-party risk management examination.

Features

U.S. Supreme Court Addresses the 'Denominator Problem' Image

U.S. Supreme Court Addresses the 'Denominator Problem'

Stewart E. Sterk

In a recent case, the U.S. Supreme Court applied what has come to be known as the <i>Penn Central</i> balancing test to uphold New York City's refusal to approve an office tower atop Grand Central Terminal.

Features

Recent Rulings on California Anti-SLAPP Motions By Entertainment Attorneys Image

Recent Rulings on California Anti-SLAPP Motions By Entertainment Attorneys

Stan Soocher

Defendants in entertainment industry cases often invoke California's "anti-SLAPP" statute, Calif. Civ. Code §425.16, which is meant to bar lawsuits filed to muffle free speech activities or a legal right to petition. This summer, some noteworthy court decisions have come out of California that involved anti-SLAPP motions filed by attorneys who are defendants themselves in entertainment litigations.

Features

7 Tips to Make a Cyber Attack Comeback Image

7 Tips to Make a Cyber Attack Comeback

Jeff Ton

While day-to-day maintenance tasks and insider risk protocols are important for long-term protection from different types of cybersecurity threats, it's important to acknowledge that no solution is 100% effective. No matter how much money a firm is currently investing in cybersecurity, the reality is that it only takes one wrong click for a breach to occur.

Features

Diversity As a Differentiator in the Legal Profession Image

Diversity As a Differentiator in the Legal Profession

John J. Buchanan

One aspect of law firms that is becoming increasingly of interest to clients — and an area that might offer opportunities for differentiation — is law firm commitment to increasing and sustaining diversity.

Features

The Role of Encryption in Law Firm Data Security Image

The Role of Encryption in Law Firm Data Security

David Greetham & David Levine

Encryption can play a vital role in securing data, but it needs to be considered within the context of a firm's overall IT security strategy. Whether, when and how to encrypt requires a careful look at what data the firm keeps, and how much protection it needs. This article explains how encryption can be used to guard against the reputational, financial and legal damage a breach of sensitive data can cause to law firms.

Columns & Departments

Cooperatives & Condominiums Image

Cooperatives & Condominiums

ljnstaff

Discussion of two key rulings.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES