Features
Secured Lender's Loss of Possessory Lien Affirmed
The U.S. Bankruptcy Appellate Panel for the Eighth Circuit held on March 25, 2013, that a lender "lost its possessory lien when it turned the Debtor's account funds over to the Trustee without first seeking adequate protection.
Features
Financing the Cloud
One subject not getting near enough attention is the role IT financing will play as companies migrate to the cloud in a bid to save costs and bring added flexibility to their business models.
Circular Lien Priorities: Tackling Three-Party Subordination
This article discusses the priority issues that can arise where three or more creditors claim a security interest in the same collateral and a recent Seventh Circuit case, <i>Caterpillar Financial Services v. Peoples National Bank,</i> that addresses this infrequently adjudicated problem.
Features
Recovery of Make-Whole Premiums
Earlier this year, the U.S. Bankruptcy Court for the Southern District of New York added to the debate on alender's right to recover a make-whole premium as part of its allowed claim in a bankruptcy case.
Cyberinsurance: Making the Policy Fit
It seems that everyone these days, from President Obama to Facebook account holders, is concerned about cybersecurity. Data breaches and cyberintrusions are front page news, and businesses are warned to take a 'when, not if' approach to these threats.
Features
Online Retailers Lose Challenge to New York's Internet Tax
In a case that has far-reaching ramifications because of the exponential expansion of cyberspace in general, and because of the growth of e-commerce in particular, the New York Court of Appeals has rejected challenges by two major online retailers to New York's 'Internet tax,' which requires collection of a sales tax on online purchases made by New York residents.
Features
e-Discovery 3.0: Preparing for a New Era of Forensic Collections
When a corporation involved in a high-profile lawsuit last year wanted to find an incriminating text message that a former employee intentionally deleted from his mobile phone, its legal team did not conduct a nationwide manhunt for the sender's device or subpoena his wireless carrier. In the modern era of high-tech litigation, the company's forensic specialists simply used the UFED Touch Ultimate data extraction, decoding and analysis tool from Israel-based Cellebrite Ltd.
Features
The War on Cybercrime Heats Up
Cybercrime is neither rare nor isolated these days. You no longer need to be a major bank, retailer, credit card company, social media site or government to become a target. Every company with an online presence, or even a connection to the Internet, has become fair game.
Features
DMCA 'Safe Harbor' Consensus Among Circuits Evolves
The Ninth Circuit recently issued an important ruling in <i>UMG Recordings, Inc. v. Veoh Networks, Inc.</i> relating to DMCA 'safe harbor' protection .
Features
Using an Online Deadline Management System To Reduce Risk
Managing deadlines is a critical part of every law practice. Missed deadlines are frequently one of the most common reasons lawyers get sued or their clients file grievances.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- Why So Many Great Lawyers Stink at Business Development and What Law Firms Are Doing About ItWhy is it that those who are best skilled at advocating for others are ill-equipped at advocating for their own skills and what to do about it?Read More ›
- The Power of Your Inner Circle: Turning Friends and Social Contacts Into Business AlliesPractical strategies to explore doing business with friends and social contacts in a way that respects relationships and maximizes opportunities.Read More ›
- Best Practices for Virtual Internal InvestigationsIn order to ensure that remote internal investigations are probative and effective, companies and their outside counsel should employ a few simple and practical practices.Read More ›
- Hiring Practices and the FCPAWhile laws such as the FCPA do not necessarily prohibit hiring individuals with criminal records or bad credit records or who are former government officials, they do require employers to identify these individuals and assess whether their hire would pose a threat, violate the laws outright or impose an administratively difficult burden due to the need to monitor their activities.Read More ›