Transmission Claims Under the Computer Fraud and Abuse Act
Beyond Computer Fraud and Abuse Act "authorization" claims, parties have also sought to use the CFAA in cases involving unauthorized "transmissions" of information that cause damage.
Features
Real Property Law
In-depth, expert analysis of several key rulings that are important to you and your practice.
Energy Conservation in Land Use Practice
By enforcing and enhancing energy codes, encouraging the use of combined heat and power and district energy systems, properly orienting and commissioning buildings, and incorporating renewable energy resources, we can unlock local land use law's potential to achieve energy conservation.
Features
Career Journal: Network to Success
Job search should be as much a part of your ongoing career management as aspirations for promotion, more responsibility, and increased compensation at your current employer. In essence, you should always be looking, if not actually taking, your next job.
Sales Speak: Keys to Business Development Success
Profitable firms invest in long-range marketing capabilities; that is, they take a view of the desired end result, land new work, and incorporate these goals into their support systems.
Professional Development: Holding the Whistle Doesn't Make You a Coach
Many leaders fall into the trap of thinking that by managing the results, they are concurrently coaching their people on how to develop and sustain business. This is not the case.
Features
Marketing Tech: Going Mobile
Why and how to get your firm's mobile website ready as quickly as possible.
Features
The Rights and Treatment of Non-Debtor Contract Counterparties in Bankruptcy
This article discusses how counterparties, as well as courts, react to situations where a counterparty seeks protection from the risks inherent in continued performance under a Contract with a debtor in bankruptcy.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- When It Comes to Trademark Searches, AI Misses the MarkArtificial intelligence tools powered by large language models have become valuable resources in the trademark process. Despite incredible progress in natural-language reasoning, AI tools still face fundamental limitations when it comes to performing even basic trademark searches. Here are five important reasons why.Read More ›
