Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


Litigation
October 28, 2010
Recent rulings of interest.
Messy Divorce Leads to Whistleblower Bounty
October 28, 2010
A computer hard drive transformed <i>Karen Zilkha v. David Zilkha</i> from a messy divorce case into an insider trading investigation that led to the downfall of a major hedge fund.
Can a Victim of Domestic Abuse Get Out of a Lease?
October 28, 2010
In our day-to-day practice as family law practitioners, we help clients negotiate their way through the maze that is divorce. Besides the usual parenting and financial issues, some clients experience abuse at the hands of their spouse, a significant other or another household member. If this happens, the victim can obtain a Protective Order. However, as is too often seen in the newspapers, the Protective Order is merely a piece of paper and does not guarantee safety.
Behavioral Finance
October 28, 2010
Behavioral Finance is a practical and pragmatic way of conceptualizing the social, cognitive, and emotional factors that influence financial decisions during a divorce.
Business Crimes Hotline
October 28, 2010
Recent rulings of interest to you and your practice.
In the Courts
October 28, 2010
Analysis of recent key rulings.
The UK's Impending Power Play and Why It Matters to You
October 28, 2010
Over the past several years, the United Kingdom has been flexing its muscles in the global anti-corruption arena with the imposition of large penalties against companies involved in foreign-bribery offenses, focusing on individual accountability for corporate officials, close coordination with U.S. prosecutors in parallel investigations, and enforcement tools such as self-disclosures, settlements and negotiated plea agreements.
Child Pornography on Workplace Computers
October 28, 2010
What are the implications of having child pornography on the premises? In businesses, child pornography generally is discovered by IT personnel. Or, if a corporation undergoes an unrelated internal investigation in which all computers, hard drives, e-mail servers, etc. are frozen and searched for responsive material, such a search can to lead to the discovery of child pornography stored on the corporation's server or on an individual's hard drive. What can/must/should be done as a result?
The Courts: Active Players in White-Collar Cases
October 28, 2010
In June, the Supreme Court unanimously held that Enron's former CEO Jeffrey Skilling did not commit "honest services" fraud, ruling that the statute under which he was convicted must be limited to bribery and kickback schemes to avoid constitutional concerns over vagueness. The decision should curtail prosecution of a variety of conduct that the government would otherwise seek to criminalize through the statute. In contrast, the courts are expanding the reach of other criminal statutes to encompass conduct previously regarded as outside their scope.
Upcoming Events
October 28, 2010
Harvard Law School Fall 2010 Entertainment Symposium<br>Nashville Bar Association Annual Entertainment Law in Review

MOST POPULAR STORIES

  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • China Finalizes New Regulations to Relax Personal Data Exports from China
    Nearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.
    Read More ›
  • Rights and Obligations In Patent Licenses
    The owner of a commercially successful patent may have competing desires. On one hand, the patent owner wants to protect the patent and secure its maximum benefit; on the other hand, the patent owner wants to avoid enforcement litigation with competitors because it is expensive and puts the patent at risk.
    Read More ›