Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 2,419 results for "Commercial Leasing Law & Strategy"...

In the Marketplace
June 26, 2012
Highlights of the latest equipment leasing news from around the country.
Secured Creditors Win Right to Credit Bid
June 26, 2012
In a major victory for secured creditors, the U.S. Supreme Court unanimously held that a Chapter 11 plan involving a sale of secured property free and clear of a creditor's lien must afford the secured creditor the right to credit bid for the property under section 363(k) of title 11 of the United States Code.
The Distressed Shipping Market Attracts Private Equity
June 26, 2012
Since the collapse of Lehman Brothers, private equity has explored the distressed markets to find hidden value. With the decline in world demand, the workhorse of the transportation sector, shipping, is an obvious target. This article explores some of the risks in an investment in shipping.
Court Watch
June 25, 2012
Highlights of the latest franchising cases from around the country.
The Pathology of Failed Law Firms
June 25, 2012
A few of the problems that faced Dewey & LeBoeuf were unique, while others were not. Nor is Dewey alone; more than 10 large and prominent firms have failed in the past decade. This article focuses on the pathology of failed law firms.
Cooperatives & Condominiums
May 30, 2012
Several key cases are discussed.
The Enforceability of Liquidated Damages Clauses in Real Estate Leases
May 30, 2012
Will courts will enforce liquidated damages clauses in real estate leases? A look at recent rulings.
In the Marketplace
May 29, 2012
Highlights of the latest equipment leasing news from around the country.
Five Tips for Avoiding Settlement Traps
May 29, 2012
When a lawsuit is settled, the clients cut a deal, the legal gladiators lay down their briefs, and everyone breathes a sigh of relief. But is that sigh premature?
Digital Copiers Don't Forget
May 29, 2012
Risk mitigation requires a good understanding of where the vulnerabilities are, and one that many companies have missed is the sensitive data that likely reside in the hard drive memories of printers, copiers, and fax machines.

MOST POPULAR STORIES