Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


Quick Tips for Rankings Success
Being singled out by one of the research-based legal rankings or directories can be a big client booster, whether it's a practice area or individual lawyers that are recognized. Here are some tips for making the cut.
Bit Parts
Arbitration Provision Read Into SAG-AFTRA Limited Exhibition Agreement<br>DVD Cover Photo Included In News Reporting Was Fair Use
Social Media Scene: Creating a Blogging Strategy When Blogging Isn't Your Business
Chances are that if you have started marketing yourself online, then you have a blog (or were told to have a blog). Here is what you need to know.
Case Notes
Discussion of two major rulings.
Commercial Alternative Lending
An impressive amount of attention and money have been foisted upon the relatively nascent alternative finance market. Is it good or bad?
Immigration Status
To provide clarity to employers as to permissible questions that may be posed to prospective employees, the authors list the most common questions that corporate clients ask ' and provide recommendations.
Supreme Court Preserves Fraud-On-the-Market Presumption in Securities Fraud Litigation
The U.S. Supreme Court recently issued its long-awaited decision in <I>Halliburton v. Erica P. John Fund, Inc.</I>, and the result was very much in line with the forecasts of those who predicted a kind of split decision.
The Scope and Limits of Article 9
A discussion of the three major categories of personal property liens excluded from Article 9, in whole or in part.
If You're Not on Facebook, You're Committing Malpractice
Imagine you're cross-examining a witness about a phone call, but you've never used a telephone before. Ridiculous, right? But is it any different than wading into a new client matter where social media communications are at issue without having ever used social media?
Insurance Coverage Disputes over Data Breaches
Each day, businesses become progressively more dependent on computers and the Internet to gather, store and protect information. But, as sophisticated as this technology may be, it has also proven to be susceptible to breaches, which have time and again resulted in the unauthorized access of confidential information.

MOST POPULAR STORIES