Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Proof and Defense of Causation in Failure-to-Warn Claims Image

Proof and Defense of Causation in Failure-to-Warn Claims

George W. Soule & Kevin P. Curry

In litigating failure-to-warn claims, the focus often is on duty (whether the manufacturer should have included a warning) and adequacy issues. In most cases, there is little attention paid to proof that the lack of a warning, or an inadequate warning, caused the accident. This article focuses on strategies for proving and defending the causation element of failure-to-warn.

Features

Privacy Ruling Reverberates in Case Against Facebook Image

Privacy Ruling Reverberates in Case Against Facebook

Marisa Kendall

Plaintiffs suing Facebook over its alleged practice of scanning direct messages are invoking a recent ruling from U.S. District Judge Lucy Koh clearing the way for a similar case against Yahoo Inc.

Unfinished Business Claims Image

Unfinished Business Claims

Robert W. Dremluk

This two-part article describes recent developments with respect to unfinished business claims, discusses the implications that those cases may have on law firm partnerships, and provides some suggestions as to what law firms may do to avoid unfinished business claim litigation.

Features

Obstruction of (Contemplated) Justice Image

Obstruction of (Contemplated) Justice

Jeffrey M. Hanna

Obstruction of justice is seeing increased use, and could prove to be a powerful tool in the federal prosecutor's toolbox. Reflective of its growing attention, as discussed further below, it is the subject of a pending U.S. Supreme Court case that will examine just how broadly this statute may reach.

Features

Collecting Social Security Numbers Image

Collecting Social Security Numbers

Nicole Pszczolkowski & L. Elise Dieterich

In the first half of 2014, at least 96 significant data breaches were reported, compromising more than 2.2 million records. Of these breaches, at least 46 involved records that may have contained Social Security Numbers (SSNs). What the affected businesses may not know is that the mere collection of SSNs may have put them in violation of state laws, in addition to the liability they may now face for having failed to protect the SSN information.

Features

Gaps in Coverage After <i>Farmers Mutual </i> Image

Gaps in Coverage After <i>Farmers Mutual </i>

Robert D. Goodman & Miranda H. Turner

Recently, the New Jersey Supreme Court addressed the question of the role of a state insurance guaranty fund within a pro rata allocation scheme. The court's opinion has called into question New Jersey's approach to allocation more generally.

Features

Changing the Law Firm Business Model Image

Changing the Law Firm Business Model

William C. Cobb

Lawyers must understand the process by which they deliver a legal solution. That means they understand every task in the process and who should be performing those tasks, whether it is a partner, an associate, a paralegal, or another professional.

Keep It Under Control Image

Keep It Under Control

Patrick W. Michael

Client questions about litigation management are always the same: How likely are we to win? How long will it take? How much will it cost? The answers vary from case to case, but metrics exist to answer the questions and to enhance litigation management.

Features

Supreme Court Misses Chance to Address Difficult Privacy Question Image

Supreme Court Misses Chance to Address Difficult Privacy Question

Leonard Deutchman

When technology changes the nature of what has been thought of as private, should the response be to continue to recognize that privacy, or to rethink what is private?

Features

Cost Savings As a Risk Management Strategy Image

Cost Savings As a Risk Management Strategy

Nina Cunningham

Since the active use of the term <i>risk management</i>, perhaps sometime in the 1980s, I have thought of the confluence of <i>risk</i> and <i>management</i> as an oxymoron.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Bankruptcy Sales: Finding a Diamond In the Rough
    There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
    Read More ›
  • Compliance Officers and Law Enforcement: Friends or Foes?
    <b><i>Part Two of a Two-Part Article</b></i><p>As we saw in Part One, regulators have recently shown a tendency to focus on compliance officers who they deem to have failed to ensure that the compliance and anti-money laundering (AML) programs that they oversee adequately prevented corporate wrongdoing, and there are several indications that regulators will continue to target compliance officers in 2018 in actions focused on Bank Secrecy Act/AML compliance.
    Read More ›
  • Artist Challenges Copyright Office Refusal to Register Award-Winning AI-Assisted Work
    Copyright law has long struggled to keep pace with advances in technology, and the debate around the copyrightability of AI-assisted works is no exception. At issue is the human authorship requirement: the principle that a work must have a human author to be eligible for copyright protection. While the Copyright Office has previously cited this "bedrock requirement of copyright" to reject registrations, recent decisions have focused on the role of human authorship in the context of AI.
    Read More ›