This article examines the FDA's current approach to mobile medical applications (MMAs) and explores the potential implications for product liability litigation if they malfunction.
- February 29, 2016Beth S. Rose
Millennials' influence on the legal marketplace is rapidly growing. To attract this group's best and brightest, law firms need to understand their mindset and habits.
February 29, 2016Rebecca GlatzerGreenberg Traurig corporate and securities shareholders Kara MacCullough and Flora Perez barely slept for eight days. That's the time they had to complete a secondary public offering for their client Restaurant Brands International, or RBI, parent of Miami-based Burger King and Oakville, Ontario-based coffee, doughnuts and sandwich chain Tim Hortons.
February 29, 2016Mary HladkyVoice search is rapidly emerging as the predominant way that consumers inquire about products, services and, yes, lawyers. Here's what you need to know.
February 29, 2016Larry BodineOne size does not fit all when it comes to social media training for lawyers, and those responsible for such training must take into account different levels of sophistication and comfort, which are not necessarily based on generations.
February 29, 2016Molly PeckmanDiscussion of a wrongful death case in which a lawyer was sanctioned for a sexist comment.
February 29, 2016The authors review 13 recent cases, dating from 2011 through 2015, that invoked the business judgment rule. The cases discussed show that the all-important Levandusky ruling is still widely applied to give deference to a broad range of board actions.
February 29, 2016Richard Siegler and Eva TalelLawyers are increasingly expected to understand the implications of cybersecurity when providing advice relating to a long list of matters that include privacy compliance, contract compliance, data breach response, data breach litigation, M&A due diligence, and insurance coverage. As a result, it is important that lawyers understand the latest trends in cyber intrusions that may expose their stakeholders to unwarranted risk and allow adversaries to exploit technical and human vulnerabilities.
February 29, 2016Steven Chabinsky

