Account

Sign in to access your account and subscription

Register

LJN Newsletters

  • In 2010, Congress enacted the Foreign Account Tax Compliance Act (FATCA) in order to target U.S. taxpayers using offshore accounts to hide monies overseas. Although Congress' purpose and intent in passing FATCA was met, it has been achieved at a cost of imposing heavy burdens on those already compliant.

    September 02, 2015Manuel Garcia-Linares and George L. Metcalfe, Jr.
  • On July 16 of this year, decisions by two federal judges once again spoke to the Pennsylvania Supreme Court's silence on a fundamental issue of tort law applicable to prescription medical product liability claims in the Commonwealth.

    September 02, 2015Mike Brophy
  • The UK's Court of Appeal gave a very important judgment in March 2015 in a case concerning Google's Internet behavior tracking through a browser. First, misuse of private information is now classified as a tort, thereby in this case enabling proceedings to be issued against a party outside the jurisdiction of the UK; and, second, financial compensation for distress caused by breaches of the Data Protection Act 1998 may now be claimed, despite there being no monetary loss.

    September 02, 2015Andr' Bywater and Gayle McFarlane
  • Each day, attorneys create and handle documents that require strict confidentiality to avoid loss of evidentiary privileges. In today's digital workplace, many of these files are exchanged via e-mail. While e-mail allows for convenience, speed and portability, each attorney using e-mail must ask before sending: "Am I putting my client's confidentiality needs and expectations, as well as my ethical obligations, at risk?"

    September 02, 2015William O'Brien
  • Federal Circuit: District Courts Must Address Intel Factors In Determining Whether to Modify A Protective Order In Foreign Proceedings
    Federal Circuit Applies An 'Abuse of Discretion' Standard of Review for a PTO 'Special Circumstances' Determination

    September 02, 2015Jeffrey S. Ginsberg
  • Storing and sharing data "in the cloud" has become, in many instances, a business necessity. The practical and economic advantages of cloud computing are clear ' it eliminates the need to send client data via traditional, costly methods, and is significantly less expensive than building and maintaining the same data storage capacity in-house.

    September 02, 2015Gregory Mottla and L. Elise Dieterich
  • Online impersonation is defined in the New York Code provisions that prohibit the practice, as the act of impersonating another "under an assumed character with intent to obtain a benefit or to injure or defraud another." The foremost case brought under this law, People v. Golb, in many ways epitomizes the bizarre and highly esoteric reasons why someone chooses to impersonate another in the first place.

    September 02, 2015Richard Raysman and Peter Brown
  • Early on in 2015, pundits were already predicting that the extent and number of data breaches from 2014 would severely pale in comparison to those that would occur in 2015. Inevitably, people across the country, victims, media, members of government, and even litigious-minded attorneys, are scrambling to determine what legal recourse exists to not only retroactively seek retribution, but also proactively enforce data security methods ' a task that is still at its nascent stages of development.

    September 02, 2015Stephen Treglia
  • Plaintiffs lawyers representing some banks and financial institutions caught up in Target's 2013 data breach say the $67 million deal struck last month between the retailer and Visa Inc. leaves their clients shortchanged.

    August 31, 2015Amanda Bronstad