Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Regulation

Features

An Analysis of Proposed Federal Cybersecurity Legislation Image

An Analysis of Proposed Federal Cybersecurity Legislation

Todd Taylor

Michael Chertoff, the former head of the U.S. Department of Homeland Security (DHS), recently remarked that "cyber threats represent one of the most seriously disruptive challenges to national security since the onset of the nuclear age 60 years ago."

Features

The JOBS Act and the Return of the Microcaps Image

The JOBS Act and the Return of the Microcaps

Aegis J. Frumento

In Part One, the author explored the JOBS Act's two new ways to raise capital ' crowdfunding and the Small Issues Exemption. Here, he look at the JOBS Act provisions aimed at making it easier for small companies to go public.

Features

<b><i>ONLINE EXCLUSIVE:</i> Second Circuit Rules Part of DOMA Unconstitutional</b> Image

<b><i>ONLINE EXCLUSIVE:</i> Second Circuit Rules Part of DOMA Unconstitutional</b>

Mark Hamblett

The Second Circuit has ruled that the definition of marriage in the Defense of Marriage Act violates equal protection and is thus unconstitutional.

Features

<b><i>ONLINE EXCLUSIVE:</i> Second Circuit Rules Part of DOMA Unconstitutional</b> Image

<b><i>ONLINE EXCLUSIVE:</i> Second Circuit Rules Part of DOMA Unconstitutional</b>

Mark Hamblett

The Second Circuit has ruled that the definition of marriage in the Defense of Marriage Act violates equal protection and is thus unconstitutional.

Features

<i>FTC v. Google</i>: Lessons Learned Image

<i>FTC v. Google</i>: Lessons Learned

Francoise Gilbert

Twice in less than 12 months, the FTC has investigated Google Inc.'s personal data-handling practices to compare them with Google's representations made in its website privacy policy and other documents. And twice in less than 12 months, the FTC has determined that Google's practices constituted misrepresentation.

Features

Corporate Internal Investigations Image

Corporate Internal Investigations

Vince Farhat, Vito Costanzo & Stacey Wang

This is the last of a three-part series giving companies a step-by-step guide for planning and conducting sensitive internal investigations into potential wrongdoing.

Features

Hostile Use of 'Friend' Request Puts Lawyers in Ethics Trouble Image

Hostile Use of 'Friend' Request Puts Lawyers in Ethics Trouble

Mary Pat Gallagher

Two New Jersey defense lawyers have been hit with ethics charges for having used Facebook in an unfriendly fashion.

Features

The Importance of Self-Regulation In Improving Digital Privacy Image

The Importance of Self-Regulation In Improving Digital Privacy

ALM Staff & Law Journal Newsletters

The National Association of Attorneys General (NAAG) has made digital privacy and online children's safety the center of its 2012-13 agenda, as the new NAAG president, Maryland attorney general Douglas Gansler, made clear in a statement in June, in announcing the "Privacy in the Digital Age" initiative.

Features

Best Practices for ERISA ' 408(b)(2) Compliance Image

Best Practices for ERISA ' 408(b)(2) Compliance

K. Jennie Kinnevy

To achieve the goals of the new ERISA laws, participants and sponsors will have access to more information which will increase the responsibility of plan sponsors to act upon the information received.

Features

The FTC Act Image

The FTC Act

L. Elise Dieterich

The pitfalls of an inadequate privacy policy; an analysis of recent litigation.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • "Holy Fair Use, Batman": Copyright, Fair Use and the Dark Knight
    The copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.
    Read More ›