Account

Sign in to access your account and subscription

LJN Newsletters

  • In the digital age, the Federal Trade Commission (FTC) has been keeping tabs on the growing trend of brands hiring so-called "influencers" — athletes, celebrities and others with large followings — to promote their products on social media. In April, the FTC turned its attention downstream to the "influencers" themselves, sending 90 letters to influencers and marketers informing them of their responsibility to "clearly and conspicuously" disclose the business relationships behind social media posts.

    May 02, 2017C. Ryan Barber
  • Part Two of a Three-Part Article

    Examining the current similarities between e-discovery and cybersecurity and details how the history of e-discovery mirrors the present of cybersecurity and is a predictor of future patterns in the cybersecurity staffing market.

    May 02, 2017Jared Coseglia
  • Proving Constitutional Violation

    Part Two of a Two-Part Article

    Conclusion of a discussion about Glisson v. Indiana Dept. of Correction, in which Alma Glisson, whose son Nicholas died while in prison, sued the correctional facility for employing the services of medical contractor Correctional Medical Services, Inc. (Corizon).

    May 02, 2017Janice G. Inman
  • Departing employees have a sense of ownership over the data that they copy. Intellectual property commonly stolen includes customer lists, secret formulas, source code, strategy documents and other trade secrets. The information is often used against the organization when the former employee goes to work for a competitor or decides to start a new company.

    May 02, 2017Timothy M. Opsitnick, Joseph M. Anguilano and Trevor B. Tucker
  • Celebrities who are fiercely protective of their image and branding fight back, bringing an increasing number of lawsuits when it appears that a video game creator has borrowed without permission. These right of publicity cases highlight the tension that exists between the rights of public figures to control the way their image and likeness is used in commercial contexts and the First Amendment.

    May 02, 2017Christine E. Weller
  • In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. The law is set to go into effect June 1, 2017. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.

    May 02, 2017Dan Whitaker
  • In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. The law is set to go into effect June 1, 2017. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.

    May 02, 2017Dan Whitaker
  • Part One of a Two-Part Article

    The issue of what constitutes a good-faith defense to a fraudulent transfer claim is a murky question that has produced a wide variety of reported decisions from appellate courts over the years. But a recent Sixth Circuit opinion sheds some clear light on a complicated fact pattern.

    May 02, 2017Michael L. Cook
  • Part Two of a Three-Part Article

    The starting point for any successful challenge under Federal Rules of Evidence (FRE) 702 and Daubert is the form and content of the witness's disclosure under Federal Rules of Civil Procedure (FRCP) 26(a)(2). Here is all you have to know.

    May 02, 2017John L. Tate