NEXT
Search Results

0 results for 'undefined'

You can use to get even better search results
August 08, 2017 | New York Law Journal

USA v. Hurant

Mann Act Leads to 14 Offense Level; Is Best Analogue to Prostitution Promotion Charges
2 minute read
August 08, 2017 | New York Law Journal

The People v. Williams

Defendant's Background Not Grounds For Dismissal of DWI in Interest of Justice
2 minute read
August 08, 2017 | New York Law Journal

Estate of Adelson

Attorney, Firm Ordered to Repay to PA Legal Fees Previously Paid For Services Rendered
3 minute read
August 08, 2017 | New York Law Journal

Accounting by Karpowitz-Mullane

New York Law Governs Issues Regarding Construction, Administration of Trust
3 minute read
August 07, 2017 | Inside Counsel

How Law Departments Can Save Money with Technology

In today’s hectic business environment, law department leaders wear a lot of hats because they take on more responsibility and accountability to…
3 minute read
Law Journal Press | Digital Book Pennsylvania Causes of Action, 12th Edition Authors: GAETAN J. ALFANO, RONALD J. SHAFFER, JOSHUA C. COHAN View this Book

View more book results for the query "*"

August 08, 2017 | New York Law Journal

USA v. Barinas

Supervision's Revocation Affirmed; Violation Charge's Adjudication Did Not Violate 'Specialty'
3 minute read
August 08, 2017 | New York Law Journal

Matter of Walegur

Removal Motion Held in Abeyance Pending Results of DNA Testing of Decedent's Child
3 minute read
August 07, 2017 | Corporate Counsel

Microsoft Deputy GC: In New Outside Counsel Program, AFAs Plus Competition Equals Success

Microsoft Corp. is taking another look at how it works with outside law firms, placing a stronger focus on alternative fee arrangements, retainer…
5 minute read
August 07, 2017 | Texas Lawyer

Third-Party Cybersecurity Strategies Critical to Preparedness

Understanding third-party service provider relationships and the security risks they present to any organization is an essential element of cybersecurity planning. Bad actors continue to exploit the risks presented by third-party service providers that maintain access to corporate-owned information systems. Over the last several years, companies have found themselves the victim of costly and high profile data breaches occurring as a result of a third-party service provider's security failures. See, e.g., In re Target Corp. Data Sec. Breach Litig., 66 F. Supp. 3d 1154 (D. Minn. 2014); In re: The Home Depot, Inc., Customer Data Sec. Breach Litig., No. 1:14-MD-2583-TWT, 2016 WL 2897520, at 1 (N.D. Ga. May 18, 2016).
36 minute read
August 08, 2017 | New York Law Journal

Lopez v. BigCommerce, Inc.

Infringement Claims Dismissed; Mark's Registration Under Lanham Act Not Shown
2 minute read

Resources

  • Practical Guidance Journal: AI in Employment Decisions and Performance

    Brought to you by LexisNexis®

    Download Now

  • The Essential Guide to Governance, Risk, and Compliance

    Brought to you by Diligent Corporation

    Download Now

  • 2024 Trends Report Mid-Year Special Edition: Update on Outside Counsel Billing Rates

    Brought to you by LexisNexis® CounselLink®

    Download Now

  • AI in Private Equity: A Guide for Gaining an Early Advantage

    Brought to you by Ontra

    Download Now