Features
Is There Standing to Prosecute Fraudulent Transfer Claims if Unsecured Creditors Have Been Fully Paid?
The answer depends, in part, on where the debtor's case is pending. In the Second Circuit, courts allow defendants to escape exposure to fraudulent transfer actions if the debtor's estate cannot identify at least one general unsecured creditor who would benefit from a recovery in that litigation. Not so in other courts.
Columns & Departments
Practice Tip: Traveling Globally
Increased concern about international child abductions has led the Department of Homeland Security and the State Department to institute certain policies and procedures for single parents travelling internationally with a child. Practitioners should pay attention to these special considerations, particularly with summer travel on the horizon.
Features
Paper's Hidden Security Risk
It is almost impossible to open a newspaper today without reading about cybersecurity breaches. Target Corp., Neimann Marcus and many other companies have been targeted, and many experts think it is only a matter of time until law firms are targeted (if it's not too late already). All this "cyber risk" may have you pining for the days before computers, when almost all information was stored on paper.
Features
Exhibits: Details and Timing
Today's lease exhibits are more numerous, have greater detail and often make up major terms and provisions of the lease. They need to be prepared and negotiated early in the lease preparation and negotiation process.
Features
Protect Your Brands on Social Media
Online counterfeit sellers are increasingly more sophisticated and are engaging in social media counterfeiting to exploit social media tools to bolster their sales of counterfeit products online.
Features
Coping with Evolving Cybersecurity Rules
Cybersecurity and data protection, more than ever, are priority items for the government and private sector. The government has reacted by proposing legislative "fixes" that would require organizations to satisfy basic levels of cybersecurity protection and disclose breaches or face fines. Whether a mandatory compliance model will be effective given the rapid pace by which technology advances is unclear. It may be unrealistic to expect the government's legislative pace to keep up with hackers.
Features
Analyzing Child Custody Reports
This article is the first installment of a four-part series offering a model for attorneys to use when faced with the task of deconstructing a forensic custody assessment.
Features
Intercreditor Agreements
This is the fourth article in a series covering various aspects of intercreditor agreements.
Columns & Departments
Real Property Law
Analysis and discussion of several key cases.
Features
Media & Communications: E Pluribus Unum: How to Think Like a Lawyer in the Crowd
Is crowdsourcing valuable? An in-depth discussion.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- Risks of “Baseball Arbitration” in Resolving Real Estate Disputes“Baseball arbitration” refers to the process used in Major League Baseball in which if an eligible player's representative and the club ownership cannot reach a compensation agreement through negotiation, each party enters a final submission and during a formal hearing each side — player and management — presents its case and then the designated panel of arbitrators chooses one of the salary bids with no other result being allowed. This method has become increasingly popular even beyond the sport of baseball.Read More ›
- Private Equity Valuation: A Significant DecisionInsiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity LitigationWhile the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.Read More ›