Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


Protect Your Brands on Social Media
June 02, 2014
Online counterfeit sellers are increasingly more sophisticated and are engaging in social media counterfeiting to exploit social media tools to bolster their sales of counterfeit products online.
Coping with Evolving Cybersecurity Rules
June 02, 2014
Cybersecurity and data protection, more than ever, are priority items for the government and private sector. The government has reacted by proposing legislative "fixes" that would require organizations to satisfy basic levels of cybersecurity protection and disclose breaches or face fines. Whether a mandatory compliance model will be effective given the rapid pace by which technology advances is unclear. It may be unrealistic to expect the government's legislative pace to keep up with hackers.
Analyzing Child Custody Reports
June 02, 2014
This article is the first installment of a four-part series offering a model for attorneys to use when faced with the task of deconstructing a forensic custody assessment.
Intercreditor Agreements
June 02, 2014
This is the fourth article in a series covering various aspects of intercreditor agreements.
Real Property Law
June 02, 2014
Analysis and discussion of several key cases.
Media & Communications: E Pluribus Unum: How to Think Like a Lawyer in the Crowd
June 02, 2014
Is crowdsourcing valuable? An in-depth discussion.
Social Media Scene: Google Plus and the Google Digital Footprint
June 02, 2014
Social networking sites have given businesses a platform to interact with customers, find potential clients, and broaden their audience base.
Analysis of Sup. Ct. <i>Raging Bull</i> Ruling
June 02, 2014
Authors and other creators of copyrighted works scored a major victory in May when the U.S. Supreme Court eliminated a significant barrier to recovering damages for copyright infringement.
In the Marketplace
May 27, 2014
Who's going where; who's doing what.
Bankruptcy Court Caps Credit Bid
May 27, 2014
A cautionary tale for secured lenders who may want to credit bid to acquire a debtor's assets.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Inferring Dishonesty: The Fifth Amendment and Fidelity Coverage
    Dishonest employees always have posed a problem for businesses. The average business may lose 6% of its annual revenues to employee fraud, and cumulatively the impact of employee theft on the economy is estimated to be $600 billion annually. <i>See</i> Association of Certified Fraud Examiners ("ACFE"), 2002 Report to the Nation on Occupational Fraud &amp; Abuse, at ii, 4 (2002), available at <i>www.cfenet.com/publications/rttn.asp.</i> Although the average loss through employee embezzlement is $25,000, where computerized financial records or transactions are involved, the average loss increases nearly twentyfold. <i>See</i> National White Collar Crime Center, <i>WCC Issue: Embezzlement/Employee Theft,</i> at 2 (2002), available at <i>http://nw3c.org/downloads/Computer_Crime_Weapon.pdf.</i>
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›