Law School Toolbox Podcast Episode 412: Listen and Learn -- Motions for Summary Judgment
What Litigants Need to Know about Summary Judgment
JONES DAY TALKS®: Tiffany v. Costco Raises Trademark Infringement, Counterfeiting Questions
Patent Infringement: Successful Litigation Stays the "Course"
Podcast: Non-binding Guidance: Examining FDA’s Enforcement Authority Over Stem Cell Clinics and Compounders
K&L Gates Triage: Avoiding the Risks Associated with Mandatory Vaccination Programs
Even employers who are devoted to higher callings can find themselves in worldly disputes with former employees over access to emails and computer files. For example, the National Institute for Newman Studies is devoted to...more
A single, multidisciplinary entity, like a university, may include certain departments that use PHI, and other departments that do not. Such institutions are eligible to (and should) self-identify as “hybrid entities” to...more
On June 18, 2018, the U.S. Department of Health and Human Services (“HHS”) Office for Civil Rights (“OCR”) announced that an HHS Administrative Law Judge (“ALJ”) granted summary judgment to OCR in an enforcement action...more
Wage and Hour - Decision Upholds Class Action Waivers in Arbitration Clauses, Resolves Circuit Split - The U.S. Supreme Court issued a long-awaited decision in Epic Systems Corp. v. Lewis on May 21, 2018, holding that...more
A number of claims have been made against companies’ directors and officers alleging a breach of fiduciary duty for failing to adequately oversee data security programs. To date, the defendants’ oversight of the programs and...more
With today’s increased focus on data breaches and related cyber liability exposure, the insurance market continues to develop policies tailored to this unique risk. Insurers are also excluding cyber risks in many traditional...more
Many of the highest-profile and headline-catching data breaches involve external breaches of a company’s electronic systems. But the reality that these headlines obscure is the fact that internal data breaches are generally...more