What’s in Your Operating Agreement? Legal Tips for Healthcare Providers
A Counterintuitive Approach to Winning Without Litigation: One-on-One with Haley Morrison
Podcast - Ejecución de facturas electrónicas
Daily Compliance News: July 21, 2025, The More Reasons Not to Go to China Edition
Sunday Book Review: July 20, 2025, The Best Books on Business Edition
RICO Section 1962(b): Acquisition or Maintenance of Control Over Legitimate Enterprises — RICO Report Podcast
Master the First Moves in Litigation for Courtroom Advantage – Speaking of Litigation Video Podcast
Understanding Discovery in Commercial Litigation
Corporate Divorce – Preventing and Managing the Break-Up of a Business Partnership
London Partner Roberta Downey Wired for Disputes: Tech, Infrastructure, and the New Frontier of Risk
Harnessing AI in Litigation: Techniques, Opportunities, and Risks – Speaking of Litigation Video Podcast
Eviction Essentials and Lease Management
New York State Restaurant Reservation Anti-Piracy Act Cracks Down on a "Leech Industry"
Aligning Business Goals with Legal Strategies Amid Regulatory Change – Speaking of Litigation Video Podcast
The Impact of the Horn Case on RICO - RICO Report Podcast
The Litigation Landscape Explained
When a co-shareholder purchases the debt obligations of the company without partners' knowledge
What happens when a majority owner makes a bad-faith capital call?
Understanding Georgia's Civil Justice Climate With Commissioner John King — Regulatory Oversight Podcast
6 Things To Consider Before Litigation
A recent series of articles by the International Association of Privacy Professionals discusses a trend in privacy litigation focused on breach of contract and breach of warranty claims. Practical Takeaways- • Courts are...more
In this episode of BIZ LIT | TODAY, Shook, Hardy & Bacon Partners Gary Miller and Camila Tobón explore Tips for Building an AI Framework. Gary co-leads Shook’s Business Litigation Practice and Camila is the director of...more
Cyber attacks are increasingly frequent and virulent. An intruder may lurk in a company’s computer system for years, or an attack may be sudden and catastrophic. Millions of people’s personal information and companies’...more