Features
Cost Recovery in 2016
2016 is in full swing and we will soon be conducting the 2016 Mattern & Associates Cost Recovery Survey. We've been conducting this bi-annual survey since 2004 and, during that time, it has become an industry resource for tracking the cost recovery practices of law firms across size and geography.
Features
The Disparate Impact of Hiring Practices
In a first-of-its-kind decision, the U.S. Court of Appeals for the Eleventh Circuit deferred to the EEOC and held that job applicants may bring "disparate impact" claims for age discrimination against potential employers, even in the absence of evidence of intentional discrimination.
Features
Internet Task Force Examines Copyright In the Digital Age
On Jan. 28, the Commerce Department issued a much-anticipated policy statement entitled "White Paper on Remixes, First Sale and Statutory Damages: Copyright Policy, Creativity, and Innovation in the Digital Economy." This article briefly describes the white paper's scope and recommendations, with a focus on the issue of statutory damages, as to which the white paper proposes several amendments to the current Copyright Act.
Features
e-Discovery In 2016 and Beyond
Electronic discovery is an ever-changing part of the legal profession. Just when lawyers and their clients feel as though they've mastered the discovery of digital evidence, the rules change or technological advances make e-discovery an even greater challenge.
Features
Privacy v. Data Security
The year 2005 really marked the beginning of the "era of data breaches," and with it, the "era of data breach lawsuits." In its place, what is now commonplace in the wake of major data breaches ' class action "privacy" litigation on behalf of data subjects, seeking millions of dollars in damages, under a dizzying array of legal theories.
Features
Can an Applicant With a Criminal History Buy a Franchise?
The character of a franchise prospect seems relevant. Franchisors want trustworthy participants in the franchise system. A credit report and a criminal history search seem reasonable to screen out undesirables. Roughly one in four adults has some criminal history that would show up on a search, and some of these crimes have since been decriminalized. Using searches of criminal histories and credit reports can also be racially discriminatory.
Features
Sup. Ct. To Clarify <i>Fogerty</i> Copyright Attorney Fees Factors
For the second time in three years, the U.S. Supreme Court is poised to consider important questions under the Copyright Act at the behest of Supap Kirtsaeng, a tenacious Thai math professor. In 2013, the Supreme Court handed Kirtsaeng an important victory in a litigation brought against him by a major publisher, holding that a copyrighted work published and purchased abroad may be resold in the United States without the permission of the copyright holder.
Features
The Advice-of-Counsel Defense and the Corporate Employee: A Loss of Balance
Ordinarily, a defendant who wishes to assert the defense of advice of counsel must unlock the door that shields his privileged communications with counsel and divulge those communications to his adversary. But when the defendant is a corporate employee who claims to have relied on advice from the corporation's attorney, the employee may not be able to unlock that door.
Features
The NJ Franchise Practices Act and the Legacy of 'Instructional Systems'
The New Jersey Franchise Practices Act is a powerful tool for those businesses that qualify for its protections. Under the NJFPA, a franchisor cannot terminate a franchisee without good cause, even where doing so would be perfectly acceptable under the parties' contract. The NJFPA also prohibits a franchisor from imposing "unreasonable standards of performance" on a franchisee.
Features
Top Security Intrusion Trends the Legal Community Should Watch
Lawyers are increasingly expected to understand the implications of cybersecurity when providing advice relating to a long list of matters. Legal counsel, as trusted neutral advisors, are uniquely qualified to help navigate risk considerations and bridge customer deliverables and workforce expectations with adequate security and shifting legal requirements. As a result, it is important that lawyers understand the latest trends in cyber intrusions.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- COVID-19: Economic Stimulus and SBA LoansA summary of information on the various provisions under the new federal economic stimulus package.Read More ›