Thought leaders from around the world contribute their perspectives on landmark cases, new legislation, and legal perspectives on new technologies, business practices, and civil procedure.
Catherine M. Brennan and Nora R. Udell
The fintech revolution has spurred a host of legal questions concerning online lending. Developments at both the federal and state level are beginning to provide some answers.
What are ‘Reasonable Steps’ to Protect Personal Information’? 5 Key Lessons from the Privacy Commissioner’s Determinations
It is important to implement reasonable steps to protect any personal information they hold against misuse, interference, loss, unauthorized access, modification or disclosure.
Residential Security Deposits Provide Protection for a Landlord, but There can be Unexpected Pitfalls
Sander A. Rikleen
On tenant’s counterclaims, the court found that landlord had violated the security deposit statute by failing to provide tenant with a receipt acknowledging acceptance of the deposit, and failing to pay interest earned on the deposit over the multi-year tenancy.
Between a Rock and a Hard Place: The Preparation and Filing of Sensitive Tax and Information Returns, and the Practitioner’s Dilemma
Richard J. Sapinski
Richard J. Sapinski and Eric L. Green discuss defending someone under investigation in a criminal tax case and examine how these cases can get complicated by “sensitive tax returns.
Chad W. King
In Ernest Cline’s dystopian novel "Ready Player One," the world’s population is addicted to a virtual reality game called the OASIS.
Kelly L. Frey Sr.
It is always important to remember that our world is largely the result of fortunate accidents.
Copyright is an exclusive right to do things like copying, reproduction, performance or communication of subject matter that qualifies for copyright protection.
Alejandro Touriño looks at the policy changes impacting information technology law in Spain in this "Law Firm of the Year" interview with Phillip Greer.
James L. Pray
Targeted cyber attacks, spear-phishing attacks, and ransomware attacks are increasing and could put your business's security on the line.
To truly flourish, the smart cities of tomorrow must harness their data—but make sure they are doing so legally, ethically, and securely.
Bradley L. Ortman
Last month, the DHS implemented a new rule to systematize its efforts to monitor social media use of intending immigrants and travelers to the United States.
The FTC, on Jan. 5, 2017, filed a complaint in the Northern District of California against an IoT device manufacturer and its U.S. subsidiary for failure to take reasonable steps to secure the products that they sell to the United States market.
What improvements do art buyers want to see in the future when it comes to resolving art disputes?
Noerr received the 2019 "Law Firm of the Year" award for Information Tehcnology Law in Germany.
Leonce A. Richard III
The limited goal of preserving a spouse’s “nest egg” prior to retirement is simply to make sure that he or she has retirement assets to use at retirement.
Roberto Arochi discusses Arochi & Lindner’s 2019 “Law Firm of the Year” award for Intellectual Property Law in Mexico in an interview with Best Lawyers.
Elizabeth S. Fitch and Theodore M. Schaer
Cybersecurity and the Claims and Litigation Management Alliance’s School of Cyber Claims
Holly K. Towle
One answer is that it’s bleak.
Kelly L. Frey Sr.
New technologies open up new ways for children to be exploited online. The Children’s Online Privacy Protection Act offers a solution.
Information technology lawyers weigh in on the question of data ownership following the GDPR's passage.
Samuel G. Kramer
Can bitcoin and other cryptocurrencies ever be adequate widespread substitutes for fiat money?
The rapidly developing technology is good for much more than just cryptocurrency exchange. What do lawyers need to know?
Data breaches have become inevitable. Here’s what you can do to respond.
John P. Hutchins
In most states, there is no general applicable rule of law forbidding one contracting party from waiving all recourse in the event of breach by the other.
Frederic M. Wilf
Cloud computing continues to be a powerful and cost-effective means to build a business with international reach.
Jim Steinberg and Lance McCord
Unlike most traditionally licensed software, cloud solutions also put the customer at risk by transmitting, storing, and processing the customer’s data outside of the customer’s networks.
Kelly L. Frey Sr.
Rather than the cloud being a thing, it is actually a process.
Brand owners seeking to obtain exclusive rights in their advertising slogans for campaigns encompassing the United States and Europe should bear in mind certain well-established principles.