The Briefing: Court Says “No Way” To 50 Cent’s Battle Over Skill House
From Rent to Rights: Building a Solid Lease Abstract
Protect Yourself and Your Business with Indemnification Understanding
Nonprofit Basics: Grant Agreements—Matching Grants, IP, Recoverable Grants & More
Nonprofit Basics: Grant Agreement Best Practices
What’s in Your Operating Agreement? Legal Tips for Healthcare Providers
Money-Saving Licensing Tips for Startups
Impuesto de Timbre: Cuantía indeterminada
Expert or Arbitrator? — PE Pathways Podcast
The Briefing: Who Owns Jack Nicklaus? Lessons for The Creator Economy From a Brand Battle
Podcast - A Comparative Guide to Obtaining an FCL: DCSA vs. the Intelligence Community
Strategies for Business Resilience in Uncertain Times
Podcast - Colaborar por contrato... sí funciona
5 Key Takeaways | Artificial Intelligence: What Tax Professionals Need to Know
Consumer Finance Monitor Podcast Episode: How to Use the Restatement of Consumer Contracts - A Guide for Judges
Third-Party Risk The competitive world of banking struggles to keep up with technological advances, particularly in a regulatory environment.
Ways Organizations Can Pursue Legal Collections
Navigating Executive Orders: Strategies for Managing Stop Work Orders and Terminations
Trade Secrets in Hollywood: Lessons from Oscar-Nominated Films - Employment Law This Week® - Spilling Secrets Podcast
(Podcast) The Briefing – Creator Contract Liability When Your Platform Disappears: The TikTok Ban
A Jan. 13 decision out of the U.S. Court of Appeals for the Sixth Circuit is one more nail in the coffin of "silent cyber." In Home Depot Inc. v. Steadfast Insurance Co., the federal appellate court agreed with the lower...more
Cyber incidents have been growing at an exponential rate in recent years. A recent report from the Identity Theft Resource Center found that there were over one billion data breach victims in Q2 of 2024, which is around five...more
Over the last several years several companies, including Marriott, Yahoo and Volkswagen, have been victimized by hackers breaking into a company’s computer network. In some cases, they have put confidential information on the...more
Tech Vendors and Cybersecurity – Are They Responsible? It has long been recommended that when you contract with a technology vendor that you include an indemnity clause in the contract wherein the vendor will indemnify you...more
Cybersecurity company Carbon Black recently issued are port of the results of a survey of chief information security officers (CISOs) of financial organizations, which showed that the financial industry is getting hammered by...more
Given the unrelenting, it seems, news reports of cyber attacks and data breaches affecting customer records and data, the issue of what are the appropriate contractual provisions that should govern data breaches in a contract...more