Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


Competitive Intelligence: Become More Relevant – Meet Your Clients' Needs Every Time
Becoming and staying relevant is a process. It is not static but always evolving. Your clients change, their needs and requests change, you change, and, throughout these experiences, you learn steps to implement and how to implement them in given situations.
Landlord & Tenant
Landlord Liable for Overcharge Collected By Tenant<br>Federal Pre-Emption Exempted Apartments from Rent Stabilization
Media & Communication: 3 Ways to Drive Higher ROI from Press Releases
In an age where law firms can quickly disseminate news to target audiences via multiple social media platforms as well as their own websites, is it finally time to put the press release out to pasture? The press release is a valuable PR tool that deserves to live on. Executed correctly, the benefits outweigh the cost.
Real Property Law
Broker Entitled to Commission Even Without Contract<br>Questions of Fact Remain About Standing to De-Accelerate Mortgage Debt<br>Installment Seller Cannot Enforce Forfeiture Clause in Ejectment Action<br>Seasonal Use Sufficient to Establish Prescriptive Easement
Active Listening Wins Clients
All too often, we read studies, which report clients' pet peeve with their services providers whom do not listening to them. Or, cited another way, clients…
Development
Changes in Regulatory Landscape Justify Rescission of Negative Declaration<br>Definition of Family Not Unconstitutionally Vague
Elections: The Hidden Security Danger for Governments
The news is replete with alleged actions of foreign governments and hackers trying to impact the democratic election process in the United States. It is incumbent upon the state and local governments to ensure the security of all elections.
Why Do Cybersecurity Programs Fail?
It seems this should be a key question for everyone in business, government, technology, and cybersecurity: If we know the problem with cybersecurity, and have ways of methods of addressing the problem, why are we still failing?
Cybersecurity Ranks Among Top Concerns of Corporate Legal Departments
A survey of more than 460 attorneys and decision makers working in corporate legal departments nationwide found that in-house teams, already stretched by limited resources, are confronting new and traditional challenges. Cybersecurity ranked among legal departments' biggest concerns for 2018.
Phishing for Whales with Spears
<b><i>What Your Organization Can Do to Protect Itself from Email-Based Attacks</b></i><p>There's no question that email has revolutionized the way we operate. Unfortunately, for all of its convenience, email has opened the door to serious security threats that include viruses, malware and fraud. Phishing scams have become a widespread problem — you'd be hard pressed to find anyone who hasn't been on the receiving end of a phishing attempt.

MOST POPULAR STORIES

  • Artist Challenges Copyright Office Refusal to Register Award-Winning AI-Assisted Work
    Copyright law has long struggled to keep pace with advances in technology, and the debate around the copyrightability of AI-assisted works is no exception. At issue is the human authorship requirement: the principle that a work must have a human author to be eligible for copyright protection. While the Copyright Office has previously cited this "bedrock requirement of copyright" to reject registrations, recent decisions have focused on the role of human authorship in the context of AI.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›