Features

Five Secrets to Drafting an Effective Default Lease
<b><I>Part One of a Two-Part Article</I></b><p>This article contains some of the lesser-known, creative clauses used to ensure either payment of rent and compliance, or a swift eviction of the commercial tenant. They are what the authors call "tools of the effective default clause."
Features
Corporate FCPA Enforcement in the Era of Trump
<b><I>Part Two of a Two-Part Article </I></b><p> As the penalties being extracted by the United States from multinational corporations for violations of anti-corruption statutes have skyrocketed in recent years, an increasing number of other countries have begun to pass or enhance their own laws prohibiting, among other things, bribery of foreign officials, and have increased the financial penalties applicable to businesses that violate those laws.
Features

The State of Data Breach Litigation and How to Avoid It
The number of records compromised in data breaches in 2016 increased an astounding 86% over 2015 breaches. This has led to numerous data breach litigations in the civil and regulatory context. What are the major cases and trends from 2016? And what can organizations do to try to reduce their risks of breaches and litigations?
Features

<b><i>Counsel Concerns</b></i><br>Dr. Luke's Suit Against Geragos Over Tweet Survives Dismissal Motion
Famed Los Angeles attorney Mark Geragos will have to face a defamation suit over his Twitter posts implying that record producer Dr. Luke raped Lady Gaga.
Features

FTC's Letter to Paid 'Influencers'
In the digital age, the Federal Trade Commission (FTC) has been keeping tabs on the growing trend of brands hiring so-called "influencers" — athletes, celebrities and others with large followings — to promote their products on social media. In April, the FTC turned its attention downstream to the "influencers" themselves, sending 90 letters to influencers and marketers informing them of their responsibility to "clearly and conspicuously" disclose the business relationships behind social media posts.
Features

State of the Industry: E-Discovery and Cybersecurity
<b><i>Part Two of a Three-Part Article</b></i><p>Examining the current similarities between e-discovery and cybersecurity and details how the history of e-discovery mirrors the present of cybersecurity and is a predictor of future patterns in the cybersecurity staffing market.
Features

Institutional Deliberate Indifference
<b><I>Proving Constitutional Violation</b></i><p>Part Two of a Two-Part Article</I></b><p>Conclusion of a discussion about <I>Glisson v. Indiana Dept. of Correction,</I> in which Alma Glisson, whose son Nicholas died while in prison, sued the correctional facility for employing the services of medical contractor Correctional Medical Services, Inc. (Corizon).
Features

Using Computer Forensics to Investigate Employee Data Theft
Departing employees have a sense of ownership over the data that they copy. Intellectual property commonly stolen includes customer lists, secret formulas, source code, strategy documents and other trade secrets. The information is often used against the organization when the former employee goes to work for a competitor or decides to start a new company.
Features

A Look at Right of Publicity Suit Over <i>Gears of War</i>
Celebrities who are fiercely protective of their image and branding fight back, bringing an increasing number of lawsuits when it appears that a video game creator has borrowed without permission. These right of publicity cases highlight the tension that exists between the rights of public figures to control the way their image and likeness is used in commercial contexts and the First Amendment.
Features

The Challenge of Complying with China's New Cybersecurity Law
In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. The law is set to go into effect June 1, 2017. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- The Brave New World of Cybersecurity Due Diligence in Mergers and Acquisitions: Pitfalls and OpportunitiesLike poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- Digital Dibs: Rival Views of Generative AI CopyrightsGAI platforms like ChatGPT and OpenAI often require very little human input, shattering this legal landscape's framework by posing a simple question: Who authored the material? We'll explore how two countries are answering this question in different ways.Read More ›