This Quick Overview will point out some procedural and substantial rights granted by the European Convention on Human Rights with respect to business matters.
This Quick Overview addresses the legal adversities and the impacts faced by the supermarket industry under Brazilian legislation that should be carefully analyzed not only by foreign investors, but also by domestic investors on a daily basis.
This Top Ten shows examples of the types of compensation often overlooked under the United States Fair Labor Standards Act.
This is a sample director indemnification agreement, under which a company agrees to indemnify its directors and officers. The sample is governed by the laws of Delaware.
This Quick Overview explains the federal law requirements for obtaining and maintaining tax-exempt status under Section 501(c)(3) of the United States tax code.
Corporations with operations in Puerto Rico are well advised to be familiar with several pieces of local legislation which can become a veritable maelstrom to the unfamiliar or uninformed employer.
This U.S.-focused article will examine the ATP Tour, Inc. v. Deutscher Tennis Bund, 91 A.3d 554 (Del. 2014) decision and the pending legislation in Delaware that prohibits a fee-shifting bylaw. Next, it will discuss some considerations that Delaware corporations should remember when choosing whether to take the risk in adopting such an amendment to their company bylaws. Finally, this article provides a recommended approach to the fee-shifting bylaw dilemma.
This article argues that impulsive personalities that tend to make last-minute decisions and dynamically change plans are drawn to small law departments.
For small law department lawyers, doing non-legal tasks comes with the territory. The author stresses the importance of unplugging from the never-ending litany of “to do” tasks and connecting with a partner, friend, child or parent.
In-house counsel should take a leading role in building upon regulatory actions to adopt cyber risk mitigation measures. This is a list of things that can and should be done before an attack occurs to position your company to effectively respond to a cyber incident.