Beyond Computer Fraud and Abuse Act "authorization" claims, parties have also sought to use the CFAA in cases involving unauthorized "transmissions" of information that cause damage.
- January 31, 2013Richard Raysman
In-depth, expert analysis of several key rulings that are important to you and your practice.
January 31, 2013ALM Staff | Law Journal Newsletters |By enforcing and enhancing energy codes, encouraging the use of combined heat and power and district energy systems, properly orienting and commissioning buildings, and incorporating renewable energy resources, we can unlock local land use law's potential to achieve energy conservation.
January 31, 2013John R. NolonJob search should be as much a part of your ongoing career management as aspirations for promotion, more responsibility, and increased compensation at your current employer. In essence, you should always be looking, if not actually taking, your next job.
January 30, 2013Michael DeCostaProfitable firms invest in long-range marketing capabilities; that is, they take a view of the desired end result, land new work, and incorporate these goals into their support systems.
January 30, 2013Allan ColmanMany leaders fall into the trap of thinking that by managing the results, they are concurrently coaching their people on how to develop and sustain business. This is not the case.
January 30, 2013Darryl CrossWhy and how to get your firm's mobile website ready as quickly as possible.
January 30, 2013Greg SutphinThis article discusses how counterparties, as well as courts, react to situations where a counterparty seeks protection from the risks inherent in continued performance under a Contract with a debtor in bankruptcy.
January 30, 2013Adam L. Rosen and Christopher J. Rubino

