Features
Forensic Mythologies and Custody Evaluations
<b><I>Part Two of a Two-Part Article</I></b><p>Last month, we looked at several commonly held beliefs about forensic psychologists and psychiatrists who conduct custody evaluations for the courts. Many of them are not necessarily true. We conclude this discussion herein.
Columns & Departments
Upcoming Event
TexasBarCLE 27th Annual Entertainment Law Institute
Features
A Dragonfly in the Ointment: Cyber Attacks on the Energy Sector May Signal Dark Days Ahead
Recent attacks may not yet have resulted in damages or disruption, but the group appears to be positioning itself to learn how the targeted energy facilities operate while attempting to gain access to operational control systems, if they have not done so already.
Features
Federal Judge Rules on the Overtime Salary Rule
Judge Mazzant issued a final ruling striking down the overtime rule. The Texas Federal Judge used essentially the same reasoning on which he based his temporary injunction ruling. In light of this final decision, the appeal of his temporary injunction likely becomes moot.
Features
Vendor Contracting for Privacy and Security
In an effort to continue to capture ongoing and new business, vendors may be opening themselves up to liability due to poorly drafted contracts with companies. In addition, in a rush by companies to have data shifted to the cloud, privacy concerns may be dangerously minimized.
Features
What's the Deal with WhatsApp?
<b><i>Investigating and Discovering Mobile Device Data</b></i><p>Analyzing data from mobile devices is still uncharted territory for many in Legal and IT. Accordingly, today's modern legal and technology professionals need to brush-up on all things mobile. This includes understanding where applicable data resides in a mobile device and what common challenges are associated with accessing, preserving and extracting this data. One such app taking the mobile device world by storm is WhatsApp.
Features
Industry Vendors Exploited Via Industry-Wide Cyber Attacks
<b><i>How to Protect Your Firm from Vendor Risks</b></i><p>The legal industry is still lulled into a false sense of security, mistakenly assuming that they are immune to a significant IT business outage, and that those unfortunate firms affected by cybercriminals were somehow lacking in adequate cybersecurity presages. That's simply not true. Even Achilles had a weak spot.
Features
Podcast: Implantable Microchips
Next in a series of podcasts looking at the cybersecurity and tech world.
Features
Social Media Grabs Attention of SCOTUS
It is a truism that law often lags technology. Near the end of the U.S. Supreme Court's past term, the Court issued a decision in which the majority opinion, by Justice Kennedy, recognized the importance of social media in most people's lives. The ramifications of the court's statements about social media are already reverberating in the courts.
Features
Inside Naming Rights Deals
Barclays Center, Levi's Stadium, Golden 1 Center, Mercedes-Benz Stadium, Hard Rock Stadium — any sports fan or concert-goer can rattle off these names as venues of spectacular games and top-notch musical performances. What is behind those names? Naming rights transactions, which are increasingly popular thanks to their unique intersection of advertising, promotional opportunities, and headline-grabbing financial terms.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How to TOOT Your Own Horn: Exceptional Self EvaluationsIt's that time again. As the year comes to a close many firms are beginning the associate review process. Even if your firm does not have a formal review process I recommend that you write a self-evaluation that outlines your achievements and specifies your goals for the coming year.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The FTC Gets Into the College Athlete NIL GameAs national champions are crowned in men's and women's basketball, hundreds of thousands of college athletes are entering the influencer marketplace for the first time and now find themselves attractive candidates in the fast growing influencer marketing arena. With influencer marketing potentially providing a 5x return on investment, many brands are eager to get into the industry, but it doesn't come without risks as the FTC Commissioner is taking a closer look at the use of influencers for marketing.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
