Account

Sign in to access your account and subscription

Register

LJN Newsletters

  • Departing employees have a sense of ownership over the data that they copy. Intellectual property commonly stolen includes customer lists, secret formulas, source code, strategy documents and other trade secrets. The information is often used against the organization when the former employee goes to work for a competitor or decides to start a new company.

    May 02, 2017Timothy M. Opsitnick, Joseph M. Anguilano and Trevor B. Tucker
  • Celebrities who are fiercely protective of their image and branding fight back, bringing an increasing number of lawsuits when it appears that a video game creator has borrowed without permission. These right of publicity cases highlight the tension that exists between the rights of public figures to control the way their image and likeness is used in commercial contexts and the First Amendment.

    May 02, 2017Christine E. Weller
  • In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. The law is set to go into effect June 1, 2017. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.

    May 02, 2017Dan Whitaker
  • In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. The law is set to go into effect June 1, 2017. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.

    May 02, 2017Dan Whitaker
  • Part One of a Two-Part Article

    The issue of what constitutes a good-faith defense to a fraudulent transfer claim is a murky question that has produced a wide variety of reported decisions from appellate courts over the years. But a recent Sixth Circuit opinion sheds some clear light on a complicated fact pattern.

    May 02, 2017Michael L. Cook
  • Part Two of a Three-Part Article

    The starting point for any successful challenge under Federal Rules of Evidence (FRE) 702 and Daubert is the form and content of the witness's disclosure under Federal Rules of Civil Procedure (FRCP) 26(a)(2). Here is all you have to know.

    May 02, 2017John L. Tate
  • When purchasing goods though an invoice, contract or otherwise, it is important to understand that a mere inspection of goods prior to purchase could waive implied warranty protections. A seller may effectively modify, or entirely exclude, implied warranties under the Uniform Commercial Code (UCC) by requiring a buyer to inspect, test or examine goods prior to purchase.

    May 02, 2017Louis DePaul and Allison Ebeck
  • Mass torts are a strong way for trial lawyers to check Big Pharma's unfettered safety violations. However, it is not a practice area without dangers; and like so many other dangers, they are often hidden.

    May 02, 2017Matthew Doebler
  • Written Agreements Are Not the Final Word

    Recently, an Ohio appellate court held that the parties' actual conduct — and not the express written provisions in their lease to the contrary — controlled in interpreting the intentions of the parties in contracting. This case serves as a good reminder for legal practitioners that our written agreements are often not the final word.

    May 02, 2017Kelly M. Gorman
  • An enlarged print of an Instagram post containing a copyrighted photo counts as a transformative use, an attorney for "appropriation artist" Richard Prince — whose use of other artists' material in his own works has made him no stranger to the courts — argued before a New York federal judge in April.

    May 02, 2017Andrew Denney