What do creditors need to know about litigation in state court and bankruptcy court?
The M&A Word of the Day™ from the Book of Jargon® – Global Mergers & Acquisitions Is Poison Pill
Can business partner disputes be defused? Can a client avoid expensive litigation?
The M&A Word of the Day® from the Book of Jargon® – Global Mergers & Acquisitions Is Best Efforts
What you need to know about Canada's new Anti-Spam Law (CASL)
Lamson Comments on Volcker Rule
Which types of employers are more susceptible to get sued?
The M&A Word of the Day™ from the Book of Jargon® – Global Mergers & Acquisitions Is Inversion
How to Avoid Corruption Risks in China
Dealmaker's Dish: Corporate Dealmaker Update
The 2013 Amendments to the Delaware General Corporation Law
The Building Blocks of a Technology Deal
How can business owners manage legal risks?
What is at will employment law?
Lease Negotiations – Interview with Jeff Moerdler, Member, Mintz Levin
Data Center Networks – Interview with Jeff Moerdler, Member, Mintz Levin
Structuring an MLP Finance
Why Choose the Dual Track Process?
Structuring Compensation Programs – Interview with David Lagasse, Member, Mintz Levin
Executive Compensation Packages – Interview with David Lagasse, Member, Mintz Levin
Bennett Jones launches Canadian Anti-Spam Information Site
TORONTO, January 22, 2014 – In response to the long-awaited regulations pertaining to the Canadian government's anti-spam legislation, Bill C-28, Bennett Jones LLP...more
In this LEVICK Daily video interview, LEVICK Senior Vice President Jason Maloni discusses the key forensic and communications challenges that accompany instances of data loss and...more
A detailed social media policy specifically addressing the ownership of social media accounts is key to a corporation’s ability to maintain ownership of an employee’s account after the employee leaves the corporation....more
In March 2012, the Obama Administration announced its Big Data Research and Development Initiative. The program involves a total of over $200 million in new commitments from several departments and agencies to improve the...more
In This Issue:
- Corporate Humor Context is Key
- Cyber Security
- Technology’s Impact on Reputation
- Blogs Worth Following
- LEVICK In the News
- Excerpt from Corporate Humor, Context is...more
Life is full of anxieties. We all know that. Some suffer worse anxieties than others. As I often say, anxiety comes and goes. Anxiety cannot be measured but is something that everyone experiences on their own terms....more
The message–that’s what I’m talking about–who’s gonna get the message sent to them first?
Data breaches, hacking, and privacy are one of the biggest news stories since 2011 and there is no sign that will be changing...more
Cyber-attacks against U.S. companies have been skyrocketing in recent years, with 2011 seeing an increase of nearly 44 percent according to the National Security Agency. While many businesses have implemented and continue to...more
application. The case highlights the evolution of publicity rights in the face of social media.
Publicity rights have been protected since the advent of the Hollywood celebrity in the second half of the 20th century. In...more
The Federal Trade Commission (“FTC”) announced the release of revised “Green Guides” on October 1, 2012. The Green Guides are intended to help marketers avoid making misleading environmental claims.
The Green Guides are...more
Infographic: The Growing Impact of Social Media
Social media sites are transforming not only the daily lives of consumers, but also how companies interact with consumers. As with the Internet boom during the mid-to-late...more
The European perspective on managing cyber risk is valuable for US companies operating internationally and also as risk management guidance when operating in the US.
Recently, an arm of the UK Government Communication...more
The CAN-SPAM act sets legal rules for commercial E-Mail and includes various provisions that apply to “any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a commercial...more
California takes citizen privacy rights seriously.
That’s the unmistakable message communicated by a recent announcement that the Office of the Attorney General of California is creating a Privacy Enforcement and...more
This week, Apple shareholders requested that its Board of Directors publish a report explaining how the board oversees privacy and data security risks. The proposal was prompted by concern that recent issues such as the...more
This article explains to in-house corporate counsels the risks, benefits, and issues to investigate regarding cloud storage of data....more
Google’s business model is based on delivering relevant search results and, increasingly, relevant ads to those who use its products. In order to do so, Google needs to know a user’s search history since search history and...more
The Federal Trade Commission (FTC) issued a report in March 2012 setting forth best practices for businesses to protect the privacy of American consumers and give them greater control over the collection and use of their...more
Elisabeth Murdoch, daughter of media baron Rupert Murdoch and a successful media executive in her own right, recently criticized her brother James, a top executive at News Corp., for pursuing profit at all costs.
Michelle Cohen recently joined Ifrah Law as a partner. Here is an edited transcript of a recent interview with Ms. Cohen.
Question: What are some of your legal experiences and strengths that you’d like to...more
Originally published in Law360, New York (May 30, 2012, 1:08 PM ET)
In This Issue:
Toothpaste, Juice Targets of New False Advertising Suits; FTC Settles Flash Cookies Action; Federal Food Marketing Guidelines Confront Hurdle; NAD Inquiry Leads to Mascara Ad Yank; Senate Seeks to Delay...more
Find a Business Organization Author »
Back to Top