Rent Acceleration Clauses in New York
When is a rent acceleration clause in a commercial lease enforceable? New York's Court of Appeals gave an answer that is unlikely to be helpful to anyone but litigators: A rent acceleration clause is enforceable unless it constitutes a penalty. The court, however, provided little guidance about when a rent acceleration clause would constitute a penalty.
Features
Communicable Diseases
Ebola arrived in the United States last fall; measles resurged this winter; and this year's influenza strains were some of deadliest in recent memory. In light of these public health threats, employers are struggling to ascertain their rights and obligations toward their workforce, including those who are infected, exposed, or at-risk.
Features
Tip for Investors: Don't Lock Out Unionized Targets
Both financial and strategic investors often instinctively reject the idea of acquiring unionized companies. This can be a mistake. Healthy, unionized enterprises can turn out to be excellent investments. The key is analyzing them correctly.
Features
Third Circuit Decides Adult Film Industry Challenge to Federal Recordkeeping Laws
Federal regulations requiring producers of pornographic material to keep records of their models' ages don't violate the First Amendment, but the warrantless searches they authorize violate the Fourth Amendment, the U.S. Court of Appeals for the Third Circuit ruled.
Features
Get a (Law) Firm Grip on Data Breaches
Law firms are as much at risk for cyber attacks as any other industry. Because of the lack of reporting requirements in the industry, it is unclear how many breaches have actually occurred. This article describes some of the reasons law firms are cyber-attack targets, steps they can take to reduce their risk, and what clients are doing to encourage law firms in those efforts.
Get a (Law) Firm Grip on Data Breaches
Law firms are as much at risk for cyber attacks as any other industry. Because of the lack of reporting requirements in the industry, it is unclear how many breaches have actually occurred. Fortunately, law firms are now recognizing the risk and beginning to take preventive action. This article describes some of the reasons law firms are cyber-attack targets, steps they can take to reduce their risk, and what clients are doing to encourage law firms in those efforts.
Cybersecurity Lawyers Getting Plenty of Company
High-profile data breaches in the past few years have been a wakeup call for corporate America ' and made cybersecurity and data privacy the next "it" practice for lawyers. There's been a gold rush to the field, practitioners say ' and the potential rewards have attracted some Johnny-come-latelies and pushed attorneys to seek out new ways of distinguishing themselves as experts.
Your Best Precedent Is Unpublished: Now What?
Imagine counsel representing litigants before a court. An attorney for one party takes a position on the issue. The court responds that, in a previously filed pleading, counsel had taken the opposite position on behalf of his or her client. The attorney responds, "No, Your Honor, that was an 'unpublished' filing. Not only am I not bound by it, in this jurisdiction, you are not even permitted to bring that unpublished filing to my attention."
Features
Leading Succession
The majority of law firms faced with generational change do not survive into the next generation after the founders retire. This risk of decline or dissolution can be greatly mitigated if your firm plans ahead of time for succession.
Features
Avoid Drowning in Data
Data is a rich source for evidence in litigation and, for many companies, a valuable asset. What is less apparent, however, is exactly how to properly manage information and its privacy and security. However, over the past several decades, best practices have been developed for establishing and managing a comprehensive privacy, data protection and information governance program. This article summarizes those learnings to suggest an approach for how to design and run a program that is right for your company.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Enhanced Oversight of Search Warrants and Title III WiretapsSearch warrants and wiretaps were once used primarily to investigate organized crime, drug dealing and terrorism. In recent years, however, prosecutors have employed these tools increasingly in the context of white-collar crime to the point where it is now commonplace.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The Right to Associate in the DefenseThe "right to associate" permits the insurer to work with the insured to investigate, defend, or settle a claim. Such partnerships protect the insurer and can prove beneficial to the insured's underlying case and ultimate exposure.Read More ›
- DOJ's Cyber Fraud Initiative: A Wake-up Call That Keeps RingingDOJ's Cyber Fraud Initiative has been a wake-up call for companies to prioritize cybersecurity and adhere to stringent standards. By leveraging the FCA, DOJ has used a powerful enforcement tool to target a wide range of cybersecurity failures and misrepresentations. The increasing focus on cybersecurity by enforcement agencies means that robust cybersecurity practices are becoming a standard expectation, not just a best practice.Read More ›