Features

Tenant Liability CERCLA Changes Under 2018 BUILD Act
One of the significant updates to the law is that now, a tenant at an industrial or manufacturing site can, under appropriate circumstances, claim the “bona fide prospective purchaser” defense to Superfund liability and escape strict, joint, and several owner/operator liabilities when leasing previously-contaminated property.
Features

Due Diligence in Distressed Community Hospitals
Many community hospitals are in distress. The causes are varied but have a constant theme — the cost to adapt to a rapidly changing environment.
Features

Blockchain and GDPR — Frenemies?
In a nutshell, GDPR mandates that individuals have access and control over the use and maintenance of their data in certain circumstances, while the foundation of blockchain relies on the immutability of data. On the surface, these concepts seem in direct conflict with each other. This article discusses the points where GDPR and blockchain share common ground, where conflicts may exist and possible approaches for mitigating those conflicts.
Features

General Data Protection Regulation: Defense or Offense?
Ostensibly, GDPR's mission is to strengthen and unify the EU's protection of online privacy rights and promote data protection for citizens of the 28 countries currently in the EU. In the global economy, however, GDPR serves as an alarm to all countries with business flowing across Europe and well beyond. Where business flows, data follow.
Features

Current Issues In Enforcing Judgments Against LLCs
When a creditor obtains a judgment against a debtor, the debtor's assets are sometimes held in membership interests in an LLC, which presents challenges for the creditor seeking recovery. The Uniform LLC Law provided for a charging order in such instances. Although the precise terms of each state's LLC laws vary, some version of the charging order procedure is available in all states.
Features

When Is a Bid or Offer a 'Spoof'?
<b><i>U.S. Supreme Court Denial of Cert Leaves Statute Vague</i></b><p>This article analyzes the confusion faced by commodity futures traders in assessing whether their trading strategies constitute illegal spoofing and examines whether the CFTC and Seventh Circuit have provided sufficient guidance on the distinction between spoofing and legitimate trading activity.
Features

Chapter 15 Practice: U.S. Venue Selection Clause Does Not Trump Distribution Scheme in Italian Restructuring Plan
The U.S. Bankruptcy Court for the District of Delaware recently ruled that choice of law and venue selection provisions in a contract between a U.S. creditor and Italian debtor did not trump the debt restructuring plan approved by an Italian bankruptcy court.
Features

Are U.S. Records Retention Requirements on a Collision Course with the GDPR's 'Right to Erasure?'
U.S. laws require companies to retain records for years, and sometimes forever, and violating U.S. records retention laws can result in domestic fines and penalties. How can U.S. companies comply with the GDPR's “right to erasure” while still fulfilling their U.S. records retention obligations?
Features

Vendor Risk Management for Law Firms: 7 Steps to Success
Most firms have extensive cybersecurity measures in place, but emerging or unclear regulatory requirements embroil them in a never-ending cycle of evaluation, best-practices review, and implementation. Firms don't just need to have their own systems secured; a responsible firm must also reduce the risk of breach at their third-party vendors. As cloud service providers become commonplace, so too does a firm's responsibility to ensure their vendors are managing risk appropriately.
Features

You're Going to Need a Bigger Boat
<b><i>Small Law Firms Face Large Regulatory Requirements</b></i><p>Unlike large firms with comparable resources with which to protect client non-public information, small firms can find themselves trapped between cyberattacks, like ransomware, that don't prejudice based on the size of firm, and regulators who are indifferent to your size, when investigating a potential violation.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- When Is a Repair Structural or Nonstructural Under a Commercial Lease?A common question that commercial landlords and tenants face is which of them is responsible for a repair to the subject premises. These disputes often center on whether the repair is "structural" or "nonstructural."Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- The Cost of Making PartnerMaking partner isn't cheap, and the cost is more than just the years of hard work and stress that associates put in as they reach for the brass ring.Read More ›