Risk Management

Don’t Push Send

Every day, attorneys transmit spreadsheets, documents and PDFs, to courts and adversaries, to third parties, and to clients. Either they […]

In A Business Deal, When Does “Zealous Advocacy” Become Crime?

If a business transaction is later deemed criminal, what are the consequences for the outside lawyer who advised on the […]

Life Sciences Companies Getting Pounded By Class Actions

Last year was a record year for securities class actions, and life sciences companies were especially hard hit. There was […]

Phishing: The Punch That Explodes

One of the most pernicious forms of cyberattack shows no signs of abating. On the contrary, it just keeps getting […]

Practical Law Firm Cybersecurity

With some ominous findings from the UK as a springboard, this article outlines major security threats to law firms and […]

Protective Orders in Litigation

What are the limits of public access to the courts? In this Today’s General Counsel article, attorney Cristin K. Traylor […]

Best Practices For Protecting Trade Secrets

The threat of losing confidential information through targeted cyber-attacks by outsiders is real, but the more likely culprits are a […]

Why Not An “NTSB” For Cyber Attacks?

Like the NTSB when it investigates plane crashes and train accidents, the proposed agency would investigate an incident and…

Will “Popcorn Lung” Litigation Expand To Coffee & Vaping?

A type of litigation that targets a flavoring used in microwave popcorn may be about to branch into coffee and […]

In-House Lawyers Can Be FCPA Targets

In one case, the company itself got off the hook on the basis of full disclosure and cooperation, but no such luck for the former GC…

Daily Updates

Sign up for our free daily newsletter for the latest news and business legal developments.

Scroll to Top