Features
Common Law Marriage
Why do so many misunderstandings about common law marriage persist? In an age where more couples say "I don't" than "I do" to traditional marriage, this article offers some points to consider.
Features
Using Forum Selection Clauses to Reduce the Uncertainty of NY's and CA's Differing Views on Non-Compete Agreements
New York enforces reasonable employee agreements not to compete. California does not. This creates a nettlesome but common situation when a New York employer has employees who work in a different state. While the issue is not limited to New York and California, the laws of New York and California — where so many entertainment companies are based — are of special interest to the industry.
Features
The Growing Convergence of Cyber-Related Crime and Suspicious Activity Reporting
Regulators and law enforcement are taking proactive steps to further leverage anti–money-laundering monitoring and reporting tools in their battle with cyber attacks and cyber crimes. In-house legal and compliance teams need to be fully versed in the latest FinCEN and bank regulatory guidance on cyber-related crimes and have the right professionals available to assist them with these matters.
Features
Don't Be United in Facing Your Next Crisis
Even if you follow the law and all the internal protocols your firm has in place, you may still find that clients and the public view your actions negatively. In situations where you believe you are in the right, the instinct is not to apologize. Here is how to correctly handle a high-profile PR crisis.
Features
Commercial Leases and the Law of Electronic Transactions
Over the past 20 years, the rise of email as a generally-accepted medium of business communication has prompted the law to allow certain contracts, including leases, to be entered into electronically, without a handwritten signature. This article addresses recent developments and the present state of the law with respect to commercial leasing and electronic media.
Features
Support Animals As an Accommodation for Persons with Disabilities
With increasing frequency, requests for emotional-support and service animals in housing lead to disputes under the Federal, State and City Discrimination Laws that protect the disabled. The requests are often mishandled by either the housing provider, the disabled person or both.
Features
Supreme Court Rules on Design of a Useful Article
Fashion, furniture, and other design-oriented companies will take note of the Supreme Court's recent decision in <i>Star Athletica, L.L.C. v. Varsity Brands, Inc.</i>, which resolved a division among the federal circuits on the issue of the separability of designs of useful articles under the Copyright Act.
Features
Financing and Leasing Technology Is a Strategic Advantage
Advances in technology and software are being made at an increasingly rapid pace. As a result, IT hardware obsolescence cycles are shrinking too. This period of exponential improvement with which we are all now familiar has shown time and again that there will continue to be breakthroughs in technology that deliver better, less expensive, and/or more robust products. How are you equipping your firm to succeed both in the present day and into the future?
Features
Would <b><i>Jevic</i></b> Have Come Out Differently with Gorsuch?
In <I>Jevic</I>, the members of SCOTUS — sans Neil Gorsuch, who had not yet been confirmed — declined the invitation to "upend" the absolute priority scheme. The question presented: "Can a bankruptcy court approve a structured dismissal that provides for distributions that do not follow ordinary priority rules without the affected creditors' consent?" SCOTUS's answer: a resounding "No." Would Gorsuch have changed that?
Features
Using Computer Forensics to Investigate Employee Data Theft
When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft-of-IP analysis in order to preserve electronic data and uncover important evidence.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- 10 Steps Legal Departments Should Be Taking to Prepare for the SEC's Newly Adopted Cybersecurity Risk Governance Rule for Public CompaniesBy readying your company's cybersecurity program now to comply with the SEC's cyber rules, you will also arm your company with a better defense against cyberthreat actors, reduce the reputational harm that comes along with a cybersecurity incident and increase investor confidence in the company's cybersecurity program.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- China Finalizes New Regulations to Relax Personal Data Exports from ChinaNearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.Read More ›
