Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


Support Animals As an Accommodation for Persons with Disabilities
May 01, 2017
With increasing frequency, requests for emotional-support and service animals in housing lead to disputes under the Federal, State and City Discrimination Laws that protect the disabled. The requests are often mishandled by either the housing provider, the disabled person or both.
Supreme Court Rules on Design of a Useful Article
May 01, 2017
Fashion, furniture, and other design-oriented companies will take note of the Supreme Court's recent decision in <i>Star Athletica, L.L.C. v. Varsity Brands, Inc.</i>, which resolved a division among the federal circuits on the issue of the separability of designs of useful articles under the Copyright Act.
Financing and Leasing Technology Is a Strategic Advantage
May 01, 2017
Advances in technology and software are being made at an increasingly rapid pace. As a result, IT hardware obsolescence cycles are shrinking too. This period of exponential improvement with which we are all now familiar has shown time and again that there will continue to be breakthroughs in technology that deliver better, less expensive, and/or more robust products. How are you equipping your firm to succeed both in the present day and into the future?
Would <b><i>Jevic</i></b> Have Come Out Differently with Gorsuch?
May 01, 2017
In <I>Jevic</I>, the members of SCOTUS — sans Neil Gorsuch, who had not yet been confirmed — declined the invitation to "upend" the absolute priority scheme. The question presented: "Can a bankruptcy court approve a structured dismissal that provides for distributions that do not follow ordinary priority rules without the affected creditors' consent?" SCOTUS's answer: a resounding "No." Would Gorsuch have changed that?
Using Computer Forensics to Investigate Employee Data Theft
April 02, 2017
When suspicions of employee data theft arise, it is important to engage a computer forensics expert to perform a theft-of-IP analysis in order to preserve electronic data and uncover important evidence.
State of the Industry: e-Discovery and Cybersecurity
April 02, 2017
<b><i>Part One of a Three-Part Article</b></i><p>There are stark differences between e-discovery and cybersecurity, most notably that cybersecurity, as an avenue of career opportunity and responsibility, is much, much bigger. An examination of the current state of both industries coupled with a deep dive into the history of e-discovery will offer a prophetic look at the likely hiring patterns, job availability, compensation trends, and industry maturation of the cybersecurity vertical over the next decade.
Got a Negative Online Review? First Things First: Turn Off Your Attorney
April 02, 2017
It happened. Some current or former client had the gall to write something less than flattering about you online. What do you do? The first thing to do, and this can be the hardest thing for attorneys, is to turn off your attorney. Feedback can be hard to take.
Are Pharmacy Benefit Managers' Cost-Containment Claims a Shell Game?
April 02, 2017
In today's political climate, one of the hottest topics is the rising cost of healthcare and drugs. Following the last election, all industries should anticipate change, especially in healthcare. While much of the focus is currently on whether the Affordable Care Act will be repealed, one of the areas the government continues to scrutinize is costs.
<i>Decision of Note</i><br>Suit Seeking Public Doman Status for 'Buck Rogers' Can Move Forward
April 02, 2017
Team Angry Filmworks' lawsuit seeking public domain status for science fiction hero "Buck Rogers" adventures is set to blast off now that the U.S. District Court for the Western District of Pennsylvania denied a request to dismiss filed by the trust that licenses Rogers material.
Information Governance: Law Firms' Cybersecurity Weak Spot
April 02, 2017
Perimeter security is only one part of a comprehensive legal data security strategy and by itself leaves open a weak spot — attackers who, using phishing or other methods, are able to bypass strong perimeter security systems, and once inside find themselves able to access a firm's emails, documents and other work product.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›