Features
Support Animals As an Accommodation for Persons with Disabilities
With increasing frequency, requests for emotional-support and service animals in housing lead to disputes under the Federal, State and City Discrimination Laws that protect the disabled. The requests are often mishandled by either the housing provider, the disabled person or both.
Features
Supreme Court Rules on Design of a Useful Article
Fashion, furniture, and other design-oriented companies will take note of the Supreme Court's recent decision in <i>Star Athletica, L.L.C. v. Varsity Brands, Inc.</i>, which resolved a division among the federal circuits on the issue of the separability of designs of useful articles under the Copyright Act.
Features
Financing and Leasing Technology Is a Strategic Advantage
Advances in technology and software are being made at an increasingly rapid pace. As a result, IT hardware obsolescence cycles are shrinking too. This period of exponential improvement with which we are all now familiar has shown time and again that there will continue to be breakthroughs in technology that deliver better, less expensive, and/or more robust products. How are you equipping your firm to succeed both in the present day and into the future?
Features
Would <b><i>Jevic</i></b> Have Come Out Differently with Gorsuch?
In <I>Jevic</I>, the members of SCOTUS — sans Neil Gorsuch, who had not yet been confirmed — declined the invitation to "upend" the absolute priority scheme. The question presented: "Can a bankruptcy court approve a structured dismissal that provides for distributions that do not follow ordinary priority rules without the affected creditors' consent?" SCOTUS's answer: a resounding "No." Would Gorsuch have changed that?
Features
Using Computer Forensics to Investigate Employee Data Theft
When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft-of-IP analysis in order to preserve electronic data and uncover important evidence.
Features
State of the Industry: e-Discovery and Cybersecurity
<b><i>Part One of a Three-Part Article</b></i><p>There are stark differences between e-discovery and cybersecurity, most notably that cybersecurity, as an avenue of career opportunity and responsibility, is much, much bigger. An examination of the current state of both industries coupled with a deep dive into the history of e-discovery will offer a prophetic look at the likely hiring patterns, job availability, compensation trends, and industry maturation of the cybersecurity vertical over the next decade.
Features
Got a Negative Online Review? First Things First: Turn Off Your Attorney
It happened. Some current or former client had the gall to write something less than flattering about you online. What do you do? The first thing to do, and this can be the hardest thing for attorneys, is to turn off your attorney. Feedback can be hard to take.
Features
Are Pharmacy Benefit Managers' Cost-Containment Claims a Shell Game?
In today's political climate, one of the hottest topics is the rising cost of healthcare and drugs. Following the last election, all industries should anticipate change, especially in healthcare. While much of the focus is currently on whether the Affordable Care Act will be repealed, one of the areas the government continues to scrutinize is costs.
Features
<i>Decision of Note</i><br>Suit Seeking Public Doman Status for 'Buck Rogers' Can Move Forward
Team Angry Filmworks' lawsuit seeking public domain status for science fiction hero "Buck Rogers" adventures is set to blast off now that the U.S. District Court for the Western District of Pennsylvania denied a request to dismiss filed by the trust that licenses Rogers material.
Features
Information Governance: Law Firms' Cybersecurity Weak Spot
Perimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The Business of Legal Spend: How Finance Professionals Can Drive Smarter Outside Counsel ManagementLegal spend has become a core business issue that now shapes financial planning, operational decision making and risk management. What once lived primarily in the legal department has become a shared responsibility across client legal, finance, and operations teams and their outside counsel.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- New Networking Resolution In 2026: Build Connection Without the StressFor lawyers, networking is still one of the most dependable and effective ways to generate new business and build a steady pipeline of referrals. The encouraging news is that networking confidence is a skill that improves with preparation, awareness and practice. Below are strategies to help you feel more relaxed, prepared, and authentic at networking functions in 2026.Read More ›
