Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


Legal Incubators and Legal Hackers
May 02, 2015
Legal training in law schools prescribes an unflinching adherence to precedent. This paradigm is further reinforced in most traditional legal practice settings. In contrast, the legal hacking ethos directly attacks the rigidity of the precedent-based mindset. Legal hackers don't think: "what's been done before?" but instead "what can we do now?"
Landlord & Tenant
May 02, 2015
A ruling in which the court adopted a broad construction of RPL 234.
Does a Broker's Tail Ever Stop Wagging?
May 02, 2015
A "tail period" is a standard clause in a listing agreement that requires the broker to register certain parties or transactions and a period of time during which the broker shall be protected and recognized as the broker for the transaction, entitled to be paid its commission pursuant to the listing agreement.
NLRB Shields Online Rants
May 02, 2015
To some, a recent labor board ruling about social media marks the end of workplace civility. To others, it's a boost to protected speech.
Securing a Document Review Center: A Practical Guide
May 02, 2015
Much ink has been spilled in recent years about information security, hacker exploits and hardware and software products used to thwart hackers. Not a single day goes by without news pertaining to the discovery of vulnerabilities in the software we use and cherish, and to hacker exploits affecting the companies we use in our daily lives.
Communicable Diseases
May 02, 2015
In the past year, communicable disease outbreaks have dominated the headlines. In light of these public health threats, employers are struggling to ascertain their rights and obligations toward their workforce, including those who are infected, exposed, or at-risk.
Are You Paying Your Employees by Commission?
May 02, 2015
Many retail and service employers try to simplify their payroll obligations by labeling certain employees as "commission" or "commission only." While federal law permits this practice in some circumstances, the rules are complicated and present many traps for the unwary.
ICANN Betting on '.law' Domain
May 02, 2015
Coming this summer, there will be a new way for law firms and lawyers to distinguish themselves on the Internet: a ".law" top-level website domain.
Is It Time to Rebuild the U.S. Franchise Regulatory System?
May 02, 2015
If you took a snapshot of all the laws and regulations governing franchising in the United States in 1979, and then took another snapshot of all the laws and regulations governing franchising today, you would find them very similar. While the rest of the world, including franchising, has been dynamic and constantly changing, franchise regulation has been, essentially, static.
Why Upgrade Your iPad, iPhone to iOS 8.3?
May 02, 2015
Apple Inc. recently released iOS 8.3, an update to its iPhone/iPad operating system. Far from a minor "maintenance" release, iOS 8.3 includes an array of fixes and features that make iPhones and iPads more useful, reliable and secure.

MOST POPULAR STORIES

  • Bankruptcy Sales: Finding a Diamond In the Rough
    There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
    Read More ›
  • The Right to Associate in the Defense
    The "right to associate" permits the insurer to work with the insured to investigate, defend, or settle a claim. Such partnerships protect the insurer and can prove beneficial to the insured's underlying case and ultimate exposure.
    Read More ›
  • DOJ's Cyber Fraud Initiative: A Wake-up Call That Keeps Ringing
    DOJ's Cyber Fraud Initiative has been a wake-up call for companies to prioritize cybersecurity and adhere to stringent standards. By leveraging the FCA, DOJ has used a powerful enforcement tool to target a wide range of cybersecurity failures and misrepresentations. The increasing focus on cybersecurity by enforcement agencies means that robust cybersecurity practices are becoming a standard expectation, not just a best practice.
    Read More ›