Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


Supreme Court Deadlock over Spousal Guaranties Will Continue to Affect Costs of Equipment Financing
June 01, 2016
This article is a follow-up to the author's September, 2015, review of best practices for obtaining spousal guaranties in equipment financing transactions in light of the Supreme Court's decision in <i>Hawkins v. Community Bank of Raymore.</i>
Drug & Device News
June 01, 2016
Discussion of several key news items that affect med mal practitioners.
Child-Support Judgments Beyond U.S. Borders
June 01, 2016
The whole purpose behind the Uniform Interstate Family Support Act (UIFSA), adopted, for example, as Article 5-b of the New York Family Court Act (FCA), is to make the process uniform, cheap and easy to register and enforce support judgments from different states. But what about a cross-border award?
Cyber Security Challenges and Potential Uninsured Exposures
June 01, 2016
This article provides a broad overview of cyber security challenges, and the insurance coverage (or lack thereof) for the financial impact of those cyber security challenges.
<b><i>Voice of the Client:</i></b> Getting to Wow!
June 01, 2016
The old-school term is Client Satisfaction. It's been replaced with Client Delight, which is defined as beyond satisfaction. No matter what you call it, best-in-class client service is where it's at ' and where it will be going for some years to come.
Measure to Manage: Understanding and Using Data to Affect Firm Change and Client Relationships
June 01, 2016
Organized and meaningful data has been leveraged in progressive organizations for years, but now that data and information is highly accessible and easily consumable via the ever-expanding digital mesh, enterprise-level expectations and related legal business impact have been elevated. With this new reality come many questions.
Survey: Distrust of Vendors Raises Questions on Data Security, Regulatory Compliance
June 01, 2016
Obviously, data breaches aren't trust builders, but many companies are skeptical even of those parties with whom they share confidential data, including their own vendors.
Litigators' Perspectives on Prince
June 01, 2016
The legendary and now deceased Prince ' singer, songwriter, producer and man of myriad other talents ' kept a bevy of high-profile lawyers busy during the past three decades. Prince developed a somewhat complicated relationship with the Internet, and fought to protect his brand and music against unauthorized use. And for that he needed lawyers, lots of them.
Workers' Compensation Fraud
June 01, 2016
Analysis of a case out of Pennsylvania.
Business Crimes Hotline
June 01, 2016
A look at a Massachusetts case in which a grand jury indicted two former executives at State Street Corp., the Boston-based financial services firm, with defrauding clients of millions of dollars on secret commissions applied to securities trades.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›