The Briefing: Court Says “No Way” To 50 Cent’s Battle Over Skill House
From Rent to Rights: Building a Solid Lease Abstract
Protect Yourself and Your Business with Indemnification Understanding
Nonprofit Basics: Grant Agreements—Matching Grants, IP, Recoverable Grants & More
Nonprofit Basics: Grant Agreement Best Practices
What’s in Your Operating Agreement? Legal Tips for Healthcare Providers
Money-Saving Licensing Tips for Startups
Impuesto de Timbre: Cuantía indeterminada
Expert or Arbitrator? — PE Pathways Podcast
The Briefing: Who Owns Jack Nicklaus? Lessons for The Creator Economy From a Brand Battle
Podcast - A Comparative Guide to Obtaining an FCL: DCSA vs. the Intelligence Community
Strategies for Business Resilience in Uncertain Times
Podcast - Colaborar por contrato... sí funciona
5 Key Takeaways | Artificial Intelligence: What Tax Professionals Need to Know
Consumer Finance Monitor Podcast Episode: How to Use the Restatement of Consumer Contracts - A Guide for Judges
Third-Party Risk The competitive world of banking struggles to keep up with technological advances, particularly in a regulatory environment.
Ways Organizations Can Pursue Legal Collections
Navigating Executive Orders: Strategies for Managing Stop Work Orders and Terminations
Trade Secrets in Hollywood: Lessons from Oscar-Nominated Films - Employment Law This Week® - Spilling Secrets Podcast
(Podcast) The Briefing – Creator Contract Liability When Your Platform Disappears: The TikTok Ban
As businesses move quickly to adopt artificial intelligence agents, contracts for their development and implementation raise novel questions around ownership, accountability, and risk. In this first post of a two-part series,...more
The amenities of a hotel have consistently played a key role in supporting hotel guest services, but as an ever-increasing number of travelers today seek more from a hotel than just a place to sleep, the industry has...more
A proposed class action lawsuit filed against Empower last month highlights the importance for 401(k) plan fiduciaries to carefully negotiate their services agreements with recordkeepers and other services providers. The...more
Kilpatrick’s Greg Silberman recently led a session at the 21st annual KTIPS (Kilpatrick Townsend Intellectual Property Seminar) on “Faulty Intelligence: Responding to an AI Incident”, focusing on how legal, security, and...more
Over a year after his office’s last privacy enforcement action, on July 1, 2025, California Attorney General Rob Bonta (AG) announced a new California Consumer Privacy Act (CCPA) settlement with Healthline Media LLC...more
In a decision about ERISA’s fiduciary duties and transparency, the Sixth Circuit in Tiara Yachts, Inc. v. Blue Cross Blue Shield of Michigan held that Blue Cross Blue Shield of Michigan (BCBSM), a third-party administrator...more
For physicians with independent practices, engaging a third-party billing company to manage the billing process is an attractive option. Medical billing is increasingly complex and time consuming, and outsourcing that...more
DORA (Digital Operational Resilience Act) is an EU regulation that sets rules for how financial entities manage ICT (Information and Communication Technology) risks. It covers areas like cyber resilience, incident reporting,...more
The Departments of Labor, Health and Human Services, and the Treasury, with the Office of Personnel Management (the “Departments”) jointly released FAQs About Consolidated Appropriations Act, 2021 Implementation Part 69...more
In many situations, practitioners recommend establishing a fiduciary committee to oversee ERISA-covered employee benefit plans. There are several reasons for this, including providing a well-defined process for...more
In a divided party-line vote, the FTC recently charged Guardian Service Industries, Inc. (Guardian), a New York City-area building services contractor, with violating Section 1 of the Sherman Act and Section 5 of the Federal...more
In 2018, there were two comprehensive state data privacy bills introduced across the United States and a whopping zero were in effect. Fast forward six years and there have been 41 new data privacy bills considered this year...more
You just received a demand that you must pay an unknown party to receive your cargo—NOW WHAT? Shippers and brokers too frequently receive payment demands for transportation services that far exceed contracted amounts or any...more
In the early morning hours of a random summer Friday in July, IT systems around the globe began to experience widespread crashes. Initial fears of a massive cyber or other malicious attack by a state-sponsored actor or...more
On Friday, September 6, 2024, the U.S. Department of Labor confirmed that its cybersecurity guidance applies to all employee benefit plans, including health and welfare plans. In 2021, the DOL issued guidance providing best...more
Corporate interest in AI, particularly generative AI (genAI), has surged dramatically. For many legal teams, there is pressure all the way from the C-suite to start using this new technology. However, the process of...more
Since the release of OpenAI’s ChatGPT, the intense hype around large language models (LLMs) and complex AI systems has exploded. Organizations have rushed to both try and buy these new tools. Along with it, a flood of...more
Artificial intelligence (AI) tools continue to proliferate, with many aiming to automate processes and increase productivity. But customers of these tools or customers of vendors who use them must understand what’s going on...more
A while back, I wrote an article titled “3 Things to Address in Digital Media Agreements,” which focused on issues related to the purchase or sale of ad space on different media channels (e.g., websites and mobile...more
When negotiating technology or data services contracts, businesses of all sizes and industries are now spending more time and attention on privacy controls. The increasing prevalence of comprehensive U.S. state privacy laws...more
Over the last several years several companies, including Marriott, Yahoo and Volkswagen, have been victimized by hackers breaking into a company’s computer network. In some cases, they have put confidential information on the...more
The questions below are intended to help in-house counsel obtain the most important information related to technology projects so they can evaluate risks to the company’s data, intellectual property, and commercial interests,...more
The shipment of goods through various complicated shipment schematics, in conjunction with commercial situations by which transportation and logistics contracting parties have ongoing relationships, often involves a series of...more
Independent schools often contract with vendors to support the school's operations and delivery of its curriculum and programming, including transportation providers, food service, cleaning and facilities maintenance,...more
Hackers have increasingly focused on third-party vendors as avenues to data held by associated businesses. On August 25, 2022, DoorDash announced that it had experienced a data breach which impacted the personal...more