New Jersey Law Journal | Commentary
By Jonathan Bick | March 24, 2022
A combination of legal, business and technological approaches is best used to address blockchain domain name legal difficulties.
By Glenn Barden, FTI Technology | March 23, 2022
It isn't a new concept—websites have been a reliable archive of information for many years. But why have websites been consistently treated differently than other data of a similar vintage, such as email, or subsequent data such as mobile and chat?
By Bill Priestap, Holden Triplett and John Auerbach | March 22, 2022
Tips for better securing your company in today's high-risk cyber environment. Incident prevention is paramount, so security must be more prominent and proactive.
By Allison Dunn | March 21, 2022
A Florida appeals court sided with a landscaping business last week, concluding that it demonstrated "excusable neglect" and it did not intentionally ignore filings connected to a personal injury lawsuit that resulted in a $2.5 million judgment in the employee's favor.
By Brandon Leahy and Chloe Delehanty | March 16, 2022
While it is still unknown how the metaverse will take shape, lawyers advising brands should familiarize themselves with the opportunities it presents, the risks involved, and strategies to consider for enhancing and protecting a client's brand.
By Cedra Mayfield | March 9, 2022
"Anything that you can do in the real world, I would imagine you could do in the virtual world," said F. Beau Howard, a partner at Fox Rothschild in Atlanta. "I don't see why the legal concepts would be too different."
By Paul M. Kaplan | February 10, 2022
This article will address the parallels with the initial Microsoft litigation in the U.S. District Court, 'U.S. v. Microsoft', regarding §2 monopolization claim under the Sherman Act and what Google can expect during the litigation.
By Victoria Hudgins | February 8, 2022
California's amended automatic-renewal law is set to go into effect in July. But a patchwork of other states' laws may push some companies to risk under-compliance.
By Jonathan Bick, Brach Eichler | January 21, 2022
If successful, a third party can use the theft of a legal identity to secure confidential information, harm marketing brand value, diminish good will and steal customers. Here's how sites can use legal, business, and technological means to protect their legal identities.
By Meghann M. Cuniff | January 7, 2022
A U.S. magistrate judge ordered Twitter to comply with a subpoena by Friday, but the company is asking for a federal judge to vacate the order instead.
Presented by BigVoodoo
The premier educational and networking event for employee benefits brokers and agents.
The Legal Intelligencer honors lawyers leaving a mark on the legal community in Pennsylvania and Delaware.
Consulting Magazine recognizes leaders in technology across three categories Leadership, Client Service and Innovation.
A large and well-established Tampa company is seeking a contracts administrator to support the company's in-house attorney and manage a wide...
We are seeking an attorney to join our commercial finance practice in either our Stamford, Hartford or New Haven offices. Candidates should ...
We are seeking an attorney to join our corporate and transactional practice. Candidates should have a minimum of 8 years of general corporat...
MELICK & PORTER, LLP PROMOTES CONNECTICUT PARTNERS HOLLY ROGERS, STEVEN BANKS, and ALEXANDER AHRENS