Features
Is There Standing to Prosecute Fraudulent Transfer Claims if Unsecured Creditors Have Been Fully Paid?
The answer depends, in part, on where the debtor's case is pending. In the Second Circuit, courts allow defendants to escape exposure to fraudulent transfer actions if the debtor's estate cannot identify at least one general unsecured creditor who would benefit from a recovery in that litigation. Not so in other courts.
Columns & Departments
Practice Tip: Traveling Globally
Increased concern about international child abductions has led the Department of Homeland Security and the State Department to institute certain policies and procedures for single parents travelling internationally with a child. Practitioners should pay attention to these special considerations, particularly with summer travel on the horizon.
Features
Paper's Hidden Security Risk
It is almost impossible to open a newspaper today without reading about cybersecurity breaches. Target Corp., Neimann Marcus and many other companies have been targeted, and many experts think it is only a matter of time until law firms are targeted (if it's not too late already). All this "cyber risk" may have you pining for the days before computers, when almost all information was stored on paper.
Features
Exhibits: Details and Timing
Today's lease exhibits are more numerous, have greater detail and often make up major terms and provisions of the lease. They need to be prepared and negotiated early in the lease preparation and negotiation process.
Features
Protect Your Brands on Social Media
Online counterfeit sellers are increasingly more sophisticated and are engaging in social media counterfeiting to exploit social media tools to bolster their sales of counterfeit products online.
Features
Coping with Evolving Cybersecurity Rules
Cybersecurity and data protection, more than ever, are priority items for the government and private sector. The government has reacted by proposing legislative "fixes" that would require organizations to satisfy basic levels of cybersecurity protection and disclose breaches or face fines. Whether a mandatory compliance model will be effective given the rapid pace by which technology advances is unclear. It may be unrealistic to expect the government's legislative pace to keep up with hackers.
Features
Analyzing Child Custody Reports
This article is the first installment of a four-part series offering a model for attorneys to use when faced with the task of deconstructing a forensic custody assessment.
Features
Intercreditor Agreements
This is the fourth article in a series covering various aspects of intercreditor agreements.
Columns & Departments
Real Property Law
Analysis and discussion of several key cases.
Features
Media & Communications: E Pluribus Unum: How to Think Like a Lawyer in the Crowd
Is crowdsourcing valuable? An in-depth discussion.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- Why So Many Great Lawyers Stink at Business Development and What Law Firms Are Doing About ItWhy is it that those who are best skilled at advocating for others are ill-equipped at advocating for their own skills and what to do about it?Read More ›
- The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business AlliesPractical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.Read More ›
- Best Practices for Virtual Internal InvestigationsIn order to ensure that remote internal investigations are probative and effective, companies and their outside counsel should employ a few simple and practical practices.Read More ›
- Hiring Practices and the FCPAWhile laws such as the FCPA do not necessarily prohibit hiring individuals with criminal records or bad credit records or who are former government officials, they do require employers to identify these individuals and assess whether their hire would pose a threat, violate the laws outright or impose an administratively difficult burden due to the need to monitor their activities.Read More ›