Do Employers Have to Pay For All Time Worked?
Do I need an attorney if I am buying or selling a business?
Corcoran: Infighting on Compensation Costs BigLaw Time and Money
Conducting Corporate Internal Investigations
Zimmermann: "Two Class" Partnership Culture Emerging in BigLaw
Appel: Corporate Inversions Could Mean Big Tax Bills For Shareholders
Hedge Funds Word of the Day™ – Accelerated Share Repurchase
Data Privacy: The Next Frontier of Corporate Compliance
Planning For The Exit – What’s Your Exit Strategy?
Hedge Funds Word of the Day™ – CFTC
What are the Implications of Alice v. CLS?
What Questions CEOs and Board Members Should Be Asking Themselves About Tax Inversions
Hedge Funds Word of the Day™ – Derivative
Legal Considerations for Web-Based Start-Ups
After SoundCloud & Wunderlist: How Berlin plans to grow its startup scene
Hedge funds word of the day™ – Big Boy Letter
How Leading Philippine Companies are Using Bonds to Their Advantage
Hedge Funds Word of the Day™ – 10b5-1 Plan
Private Equity's Inversion Excursion: Pepper Hamilton Talks Tax With the Deal
What Does the Supreme Court Ruling in Alice v. CLS Mean to a Software Entrepreneur?
All this week, we are featuring a series “Cyber Risks – Director Liability and Potential Gaps in D&O Coverage”
Part 2 of 5: Why Directors Should Be Concerned...more
On 17 May, Mrs Justice Asplin delivered a judgment in the Chancery Division of the High Court of Justice. The dispute concerned intellectual property rights in hedge fund computer software that was the "cornerstone of the...more
With the rise of BaaS (or Backend as a service) platforms, it is easier than ever to create a mobile app on the fly. But Fenwick privacy co-chair Tyler Newby advises that companies should be aware of some important privacy...more
Amended Complaint (Exempt from Arbitration) filed on May 14th, 2013 by Plaintiff Chad Elie v. Ifrah PLLC, a Professional Limited Liability Company, Alain Jeffrey Ifrah a/k/a Jeff Ifrah, individually, etc. , et. al,,...more
With data security breaches dominating the headlines and a rising number of employees taking advantage of BYOD, or bring your own device to work policies, businesses have found themselves vulnerable to targets by hackers,...more
Cybersecurity may be the SEC’s newest area for enforcement actions. While the SEC first released Disclosure Guidance concerning cybersecurity in 2011, the recent media attention surrounding significant cybersecurity breaches...more
What you need to know:
The Martoma insider trading case is the latest in, and largest of, a string of actions brought by the Securities and Exchange Commission related to the alleged misuse of confidential clinical trial...more
The CAN-SPAM act sets legal rules for commercial E-Mail and includes various provisions that apply to “any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a commercial...more
Originally published in Law360, New York (September 19, 2012, 10:56 AM ET)
In In re Rigel Pharmaceuticals Inc. Securities Litigation (9th Cir. Sept. 6, 2012), the United States Court of Appeals for the Ninth Circuit...more
In In re Rigel Pharmaceuticals, Inc. Securities Litigation, No. 10-17619, 2012 WL 3858112 (9th Cir. Sept. 6, 2012), the United States Court of Appeals for the Ninth Circuit held that disagreements between plaintiffs and...more
Ensuring that key business data survives unexpected events is vital for businesses large and small. That’s why every business should have a plan in place to ensure the availability of its data when manmade or natural...more
An introduction to the Uniform Domain Name Dispute Resolution Policy. This article originally appeared in the Maryland Bar Association Bar Bulletin....more
Contracts are legally binding documents. As long as the contract is legally enforceable and properly executed, whatever is written into the contract will be legally binding on the parties. Therefore, it is important that...more
Find a Business Organization Author »
Back to Top