Features
New Jersey's Tort Claims Act
Is there a bright-line rule for when a claimant is put on notice of a physician's status as a public employee for purposes of New Jersey's Tort Claims Act? The answer may be found in the matter of <I>Biassou v. Fitzsimmons</I>, in which the trial court and Appellate Division ruled that a plaintiff's claims were barred under the Tort Claims Act for failing to timely file a notice of claim.
Money, Emotion and the Monetary Blueprint
Money means different things to different people, and family law professionals don't always take adequate note of that, says the author, a Certified Divorce Financial Analyst. This is where the challenge lies, she says.
Features
Social Media Scene: It's Time to Reassess Your Social Media Goals
Given that the social media landscape of today is already drastically different than the social media landscape of three years ago, how should legal marketers invest their time and money in order to derive the greatest return on their investments? The answer starts with a thorough look at a law firm's social media goals.
Features
NJ Businesses Are Vulnerable to Unionization
Although private-sector union membership in the United States is near its all-time low at just under 7%, recent actions by the NLRB and DOL make New Jersey businesses vulnerable to unionization now more than ever.
Features
Banks and Landlords: Competing Lien Interests
Banks that provide financing for commercial tenants and the real estate landlords for those same tenants both want additional security in the tenant's personal property located at the premises. This article provides a discussion of the varied interests of the landlord and the tenant's lender in the tenant's personal property, along with suggested compromise solutions.
Features
Crisis: Controlling the Threats and Seizing the Opportunities
When it comes to crises, businesses practically tie themselves in knots trying to avoid any potential conflict. But what are the best ways to control a crisis once it comes up?
Foreign Whistleblowers Fuel SEC Enforcement Activity, Raising the Stakes for Global Corporate Compliance
An "eligible" whistleblower is a person who voluntarily provides original information about a possible violation of the federal securities laws that has occurred, is ongoing, or is about to occur. If that information leads to a successful SEC action resulting in an order of monetary sanctions over $1 million, the whistleblower(s) can collect their bounty. Over the lifetime of the program, the SEC has addressed more than 390 award claims and has awarded more than $67 million to 29 individuals, known as claimants, in connection with 16 actions.
<b><i>Legal Tech</b></i> Could Federal Courts' Inherent Powers Upend the New Amendments to Rule 37(e)?
The recent amendments to the Federal Rules of Civil Procedure completely overhauled the sanctions portion of Rule 37, and were designed to resolve conflicts on the standards to apply in ordering spoliation sanctions. But one recent decision indicates that neither may be the debate on the standards a federal court can employ in ruling on a spoliation motion.
Features
Debtor's Power to Reject Executory Contract Trumps Counter-Party Debtor's Power to Assume Same Agreement
Among the various rights and protections afforded by the Bankruptcy Code to a debtor-in-possession, one of the most potent is the debtor's broad authority to assume or reject existing executory contracts and unexpired leases. Indeed, this power is one of the most useful tools available to a debtor, and in certain cases, it can be a major or even a primary reason for the bankruptcy filing.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- Private Equity Valuation: A Significant DecisionInsiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity LitigationWhile the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.Read More ›
- What Does 2024 Hold for Cybersecurity?Our annual poll of experts on the trends and developments to watch out for in 2024 in AI, data privacy, cybersecurity, e-discovery and more.Read More ›