Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

The State of Lawyer Well-Being Is Not Strong Image

The State of Lawyer Well-Being Is Not Strong

Stacey Dougan

A 2016 study found that between 21% and 36% of lawyers fall into the category of "problem drinkers." As for other mental illnesses common to the profession, 28% reported struggling with depression, 19% with anxiety, and 23% with stress. What can be done?

Features

Protecting Product Packaging and Product Configuration Image

Protecting Product Packaging and Product Configuration

Marcus S. Harris

Registering and protecting product designs is challenging. Preliminarily, trade dress cannot be registered or protected as a trademark if it is functional — if it is “essential to the use or purpose of the article or it affects the cost or quality of the article.”

Features

Bitcoin Is Fueling the Ransomware Epidemic Image

Bitcoin Is Fueling the Ransomware Epidemic

M. Scott Koller

Money is a powerful motivator, but it alone wasn't enough to fuel the ransomware epidemic. After all, the first documented ransomware infection was in 1989, but it remained relatively unknown until its resurgence over the past five years. So what changed? In short, bitcoin.

Features

The Myth of the Secure Cloud Image

The Myth of the Secure Cloud

Nina Cunningham

“There's really no such thing as the cloud, there are only other people's computers.” This may have been true at first; but it is now worth some investigation if the present threat environment today demands a secure cloud.

Features

DRaaS: How It Takes a Law Firm's DR Beyond Insurance Image

DRaaS: How It Takes a Law Firm's DR Beyond Insurance

Jeff Ton

With expectations for an always-on law firm, significant challenges within the legal industry to maintain competitiveness and perform due practice for cybersecurity and other disaster scenarios come from both clients and regulatory bodies. A comprehensive approach with an end-to-end availability strategy is imperative to mitigate the threats of downtime. And yet, this is easier said than done.

Features

The Myth of the Secure Cloud Image

The Myth of the Secure Cloud

Nina Cunningham

"There's really no such thing as the cloud, there are only other people's computers." This may have been true at first; but it is now worth some investigation if the present threat environment today demands a secure cloud.

Features

DE Supreme Court Clarifies Role of Deal Price In Appraisal Fair Value Determination Image

DE Supreme Court Clarifies Role of Deal Price In Appraisal Fair Value Determination

P. Clarkson Collins Jr.

Corporate practitioners have been closely following developments in Delaware's shareholder appraisal litigation. Much of the interest concerns the court's "fair value" determination and the risk that an acquiring company will have to pay appraisal petitioners more than the merger deal price. In a much-anticipated decision, the Delaware Supreme Court provides valuable guidance about the relative importance of the deal price in the court's adjudication of the "fair value" of a petitioner's shares.

Features

Procedures for Protecting Entertainment Domain Names Against Cybersquatters Image

Procedures for Protecting Entertainment Domain Names Against Cybersquatters

Karen Levin, Ariel Ronneburger & Damias Wilson

Because there are so many new digital channels for possible intellectual property infringement, knowledge of the various mechanisms available to combat the issue is vital to enabling entertainment industry owners to protect their brand.

Features

The Equifax Breach: Why This One Is Different Image

The Equifax Breach: Why This One Is Different

F. Paul Greene

This is not the first time that a credit reporting agency has been breached, nor is it the first time that Equifax has reported a breach. What <i>is</i> different with the current breach is its size and the nature of information compromised, as well as the implications of the breach in light of the increasingly complex web of cybersecurity regulations nationwide.

Features

Quarterly State Compliance Review Image

Quarterly State Compliance Review

Sandra Feldman

This edition of the Quarterly State Compliance Review looks at some legislation of interest to corporate lawyers that went into effect between Aug. 1 and Oct. 1, 2017, including amendments to Delaware's corporation and LLC laws.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Bankruptcy Sales: Finding a Diamond In the Rough
    There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
    Read More ›
  • Supreme Court Asked to Assess Per Se Rule Tension in Criminal Antitrust
    In recent years, practitioners have observed a tension between criminal enforcement of the broadly written terms of the Sherman Antitrust Act of 1890 and the modern Supreme Court's notions of statutory interpretation and due process in the criminal law context. A certiorari petition filed in late August in Sanchez et al. v. United States, asks the Supreme Court to address this tension, as embodied in the judge-made per se rule.
    Read More ›
  • Restrictive Covenants Meet the Telecommunications Act of 1996
    Congress enacted the Telecommunications Act of 1996 to encourage development of telecommunications technologies, and in particular, to facilitate growth of the wireless telephone industry. The statute's provisions on pre-emption of state and local regulation have been frequently litigated. Last month, however, the Court of Appeals, in <i>Chambers v. Old Stone Hill Road Associates (see infra<i>, p. 7) faced an issue of first impression: Can neighboring landowners invoke private restrictive covenants to prevent construction of a cellular telephone tower? The court upheld the restrictive covenants, recognizing that the federal statute was designed to reduce state and local regulation of cell phone facilities, not to alter rights created by private agreement.
    Read More ›