Account

Sign in to access your account and subscription

LJN Newsletters

  • Part Two of a Two-Part Article

    As the penalties being extracted by the United States from multinational corporations for violations of anti-corruption statutes have skyrocketed in recent years, an increasing number of other countries have begun to pass or enhance their own laws prohibiting, among other things, bribery of foreign officials, and have increased the financial penalties applicable to businesses that violate those laws.

    May 25, 2017Robert J. Anello and Peter Janowski
  • The number of records compromised in data breaches in 2016 increased an astounding 86% over 2015 breaches. This has led to numerous data breach litigations in the civil and regulatory context. What are the major cases and trends from 2016? And what can organizations do to try to reduce their risks of breaches and litigations?

    May 02, 2017Aaron D. Charfoos and Sean C. Griffin
  • In the digital age, the Federal Trade Commission (FTC) has been keeping tabs on the growing trend of brands hiring so-called "influencers" — athletes, celebrities and others with large followings — to promote their products on social media. In April, the FTC turned its attention downstream to the "influencers" themselves, sending 90 letters to influencers and marketers informing them of their responsibility to "clearly and conspicuously" disclose the business relationships behind social media posts.

    May 02, 2017C. Ryan Barber
  • Part Two of a Three-Part Article

    Examining the current similarities between e-discovery and cybersecurity and details how the history of e-discovery mirrors the present of cybersecurity and is a predictor of future patterns in the cybersecurity staffing market.

    May 02, 2017Jared Coseglia
  • Proving Constitutional Violation

    Part Two of a Two-Part Article

    Conclusion of a discussion about Glisson v. Indiana Dept. of Correction, in which Alma Glisson, whose son Nicholas died while in prison, sued the correctional facility for employing the services of medical contractor Correctional Medical Services, Inc. (Corizon).

    May 02, 2017Janice G. Inman
  • Departing employees have a sense of ownership over the data that they copy. Intellectual property commonly stolen includes customer lists, secret formulas, source code, strategy documents and other trade secrets. The information is often used against the organization when the former employee goes to work for a competitor or decides to start a new company.

    May 02, 2017Timothy M. Opsitnick, Joseph M. Anguilano and Trevor B. Tucker
  • Celebrities who are fiercely protective of their image and branding fight back, bringing an increasing number of lawsuits when it appears that a video game creator has borrowed without permission. These right of publicity cases highlight the tension that exists between the rights of public figures to control the way their image and likeness is used in commercial contexts and the First Amendment.

    May 02, 2017Christine E. Weller
  • In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. The law is set to go into effect June 1, 2017. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.

    May 02, 2017Dan Whitaker
  • In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. The law is set to go into effect June 1, 2017. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.

    May 02, 2017Dan Whitaker