Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 2,807 results for "Product Liability Law & Strategy"...

Asserting Damages for Data Piracy Under the CFAA
When a database is breached in one way or another, the results can be devastating. Many companies suffering this kind of loss turn to litigation, often under the Computer Fraud and Abuse Act, which prohibits improperly accessing a protected computer. There is, however, a growing consensus in the Second Circuit that recovery of certain forms of damages under the CFAA simply is not permitted.
The DOJ's New Parameters for Evaluating Corporate Compliance Programs
The parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.
Do Your Employment Practices Violate Antitrust Law? They Might!
Did you know that certain employment practices could violate antitrust law? This is the message to be gleaned from joint guidance recently issued by the Federal Trade Commission (FTC) and the Department of Justice (DOJ) Antitrust Division
Do Your Employment Practices Violate Antitrust Law?
This article provides critical background on DOJ policy and practice, and highlights some of the steps corporate counsel can take during leniency or plea negotiations to secure non-prosecution protection for the company's employees as part of any antitrust corporate disposition.
In the Courts
Recently, the Ninth Circuit set aside the convictions of Walter Liew, a Chinese-American engineer, for witness tampering and making false statements to the court. Here's an in-depth look at the case.
State of the Industry: E-Discovery and Cybersecurity
<b><i>The Future State of the E-Discovery Job Market Will Be Cloud and Contract Staffing</b></i><p><b><i>Part Three of a Three-Part Article</b></i><p>If the history of e-discovery is the future of cybersecurity, then what should one expect for the future of e-discovery? How long will the current period of consolidation continue? What will be the next chapter in e-discovery's never-ending reinvention? How closely will the next 10 years of cybersecurity job trends mirror e-discovery's past?
Patient Safety Work Product and Its Limitations: A Discussion of Two Recent Cases
In the context of medical malpractice litigation, it is important for lawyers representing the injured patient and health care providers to understand the overall purpose of the Healthcare Quality and Improvement Act, as well as its limitations as far as patient safety work product is concerned.
Supreme Court Turns Back the Clock on Venue In Patent Infringement Litigation
Although <i>TC Heartland LLC v. Kraft Foods</i> answers the question of where a domestic corporation resides in patent infringement cases, it does not fully answer the question of where proper venue lies.
Defamation and the Disgruntled Defendant
<b><I>Anti-SLAPP Legislation and the Defamation Claim</I></b><p><b><I>Part Two of a Two-Part Article</I></b><p>In last month's newsletter, we began discussion of a defamation claim brought against two attorneys who took to the airwaves to publicize their client's complaints against a hospital and its owner. The defendants in that matter sought redress for what they claimed were untrue, and very unflattering, statements, but the attorneys moved for dismissal of the claims. We continue here with the court's reasons for granting the attorneys' motion.
Healthcare Bankruptcy: Not Garden-Variety
For the remainder of 2017, due in part to the current uncertainty in the healthcare industry and its legislative oversight, more financially distressed providers are considering Chapter 11 bankruptcy to effectuate closures, consolidation, restructurings and related transactions.

MOST POPULAR STORIES

  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Technology in Marketing: Where to Invest Your Marketing Technology Dollars
    Law firms have realized that using technology ' particularly the Internet ' is a powerful tool for creating a more level playing field to enhance their images, expand their visibility in targeted markets and drive business to their firms. However, with so many competing interests for limited marketing dollars, where should you invest your firm's resources to get the most bang for the buck?
    Read More ›
  • Coverage Issues Stemming from Dry Cleaner Contamination Suits
    In recent years, there has been a growing number of dry cleaners claiming to be "organic," "green," or "eco-friendly." While that may be true with respect to some, many dry cleaners continue to use a cleaning method involving the use of a solvent called perchloroethylene, commonly known as perc. And, there seems to be an increasing number of lawsuits stemming from environmental problems associated with historic dry cleaning operations utilizing this chemical.
    Read More ›