Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

<b><i>Online Extra</b></i><br> Google Sues to Block 'Repugnant' Canadian Court Decision Image

<b><i>Online Extra</b></i><br> Google Sues to Block 'Repugnant' Canadian Court Decision

Ben Hancock

Google Inc. has filed suit in U.S. federal court seeking to block enforcement of a decision by the Supreme Court of Canada that would require the search giant to delist certain search results worldwide.

Features

<b><i>Online Extra</i></b><br> Pokéstop: Judge Calls Timeout in Suit Against Pokémon Go Maker Image

<b><i>Online Extra</i></b><br> Pokéstop: Judge Calls Timeout in Suit Against Pokémon Go Maker

Ross Todd

A federal judge has pressed pause on a group of lawsuits targeting the maker of augmented reality game Pokémon Go with nuisance and trespass claims for placing virtual landmarks on top of real property.

Features

<b><i>Online Extra</i></b><br>Publishers Seek Antitrust Exemption to Better Negotiate With Google, Facebook Image

<b><i>Online Extra</i></b><br>Publishers Seek Antitrust Exemption to Better Negotiate With Google, Facebook

Todd Cunningham

U.S. newspaper publishers, who say they are chafing under the market power of Google and Facebook, are calling on Congress to allow them to negotiate collectively with the online giants.

Features

Third-Party Cybersecurity Strategies Critical to Preparedness Image

Third-Party Cybersecurity Strategies Critical to Preparedness

David F. Katz, Richard D. Smith, Elizabeth K. Hinson, Jason Mark Anderman & Sarah Statz

This article examines the guidelines published by Board of Governors of the Federal Reserve System on managing outsourcing risk, along with the Office of the Comptroller of the Currency (OCC) 2013 OCC Bulletin 2013-29 and the supplemental Jan. 24, 2017, examination procedures, which are designed to help bank examiners tailor the examinations of national banks and federal savings associations determine the scope of the third-party risk management examination.

Features

U.S. Supreme Court Addresses the 'Denominator Problem' Image

U.S. Supreme Court Addresses the 'Denominator Problem'

Stewart E. Sterk

In a recent case, the U.S. Supreme Court applied what has come to be known as the <i>Penn Central</i> balancing test to uphold New York City's refusal to approve an office tower atop Grand Central Terminal.

Features

Recent Rulings on California Anti-SLAPP Motions By Entertainment Attorneys Image

Recent Rulings on California Anti-SLAPP Motions By Entertainment Attorneys

Stan Soocher

Defendants in entertainment industry cases often invoke California's "anti-SLAPP" statute, Calif. Civ. Code §425.16, which is meant to bar lawsuits filed to muffle free speech activities or a legal right to petition. This summer, some noteworthy court decisions have come out of California that involved anti-SLAPP motions filed by attorneys who are defendants themselves in entertainment litigations.

Features

7 Tips to Make a Cyber Attack Comeback Image

7 Tips to Make a Cyber Attack Comeback

Jeff Ton

While day-to-day maintenance tasks and insider risk protocols are important for long-term protection from different types of cybersecurity threats, it's important to acknowledge that no solution is 100% effective. No matter how much money a firm is currently investing in cybersecurity, the reality is that it only takes one wrong click for a breach to occur.

Features

Diversity As a Differentiator in the Legal Profession Image

Diversity As a Differentiator in the Legal Profession

John J. Buchanan

One aspect of law firms that is becoming increasingly of interest to clients — and an area that might offer opportunities for differentiation — is law firm commitment to increasing and sustaining diversity.

Features

The Role of Encryption in Law Firm Data Security Image

The Role of Encryption in Law Firm Data Security

David Greetham & David Levine

Encryption can play a vital role in securing data, but it needs to be considered within the context of a firm's overall IT security strategy. Whether, when and how to encrypt requires a careful look at what data the firm keeps, and how much protection it needs. This article explains how encryption can be used to guard against the reputational, financial and legal damage a breach of sensitive data can cause to law firms.

Columns & Departments

Cooperatives & Condominiums Image

Cooperatives & Condominiums

ljnstaff

Discussion of two key rulings.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Coverage Issues Stemming from Dry Cleaner Contamination Suits
    In recent years, there has been a growing number of dry cleaners claiming to be "organic," "green," or "eco-friendly." While that may be true with respect to some, many dry cleaners continue to use a cleaning method involving the use of a solvent called perchloroethylene, commonly known as perc. And, there seems to be an increasing number of lawsuits stemming from environmental problems associated with historic dry cleaning operations utilizing this chemical.
    Read More ›
  • The Flight to Quality and Workplace Experience
    That the pace of change is "accelerating" is surely an understatement. What seemed almost a near certainty a year ago — that law firms would fully and permanently embrace work-from-home — is experiencing a seeming reversal. While many firms have, in fact, embraced hybrid operations, the meaning of hybrid has evolved from "office optional," to an average required 2 days a week, to now many firms coming out with four-day work week mandates — this time, with teeth.
    Read More ›
  • AI or Not To AI: Observations from Legalweek NY 2023
    This year at Legalweek, there was little doubt on what the annual takeaway topic would be. As much as I tried to avoid it for fear of beating the proverbial dead horse, it was impossible not to talk about generative AI, ChatGPT, and all that goes with it. Some fascinating discussions were had and many aspects of AI were uncovered.
    Read More ›
  • The Powerful Impact of The Non-Foreclosure Notice of Pendency
    RPAPL ' 1331 and RPAPL ' 1403 Notices of Pendency are requisite elements for foreclosing a mortgage. <i>See, Chiarelli v. Kotsifos</i>, 5 A.D.3d 345 (a notice of pendency is a prerequisite to obtaining a judgment in a mortgage foreclosure action); <i>Campbell v. Smith</i>, 309 A.D.2d 581, 582 (a notice of pendency is required in a foreclosure action under RPAPL Article 13). In contrast, an ex parte CPLR Article 65 Notice of Pendency (the "Notice") is not required but it is a significant tool in an action claiming title to, or an interest in or the use or enjoyment of, another's land. The filer does not have to make a meritorious showing or post a bond. Article 65 provides mechanisms for the defendant-owner to vacate the Notice that caused an unilaterally imposed restraint on its realty. But, recent case law establishes the near futility of such efforts if the plaintiff has satisfied the minimal statutory requisites for filing the Notice.
    Read More ›