Search for: "People v. Boston" Results 361 - 380 of 1,751
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
30 Apr 2019, 9:40 am by Karen Gullo
”The previously undisclosed government information was obtained as part of a lawsuit, Alasaad v. [read post]
28 Mar 2019, 8:56 am by Ronald Collins
The following is a series of questions posed by Ronald Collins to Stephen Budiansky concerning Budiansky’s book “Oliver Wendell Holmes: A Life in War, Law, and Ideas” (W.W. [read post]
27 Mar 2019, 1:00 am by Thaddeus Mason Pope, JD, PhD
Science, Scholarship, and Policymaking Scott Burris, Temple University, Science, Interdisciplinarity, and Health Law Scholarship Kevin Outterson, Boston University, Bad Science Leads to Bad Legal Scholarship Joanna Sax, California Western School of Law, Consumer Perceptions of Risk in Various Areas of Biotechnology C. [read post]
13 Mar 2019, 8:00 am by Guest Blogger
  People move to the cities and fertile farm land where wealth is to be had, so the more people a state had, the wealthier the state would be. [read post]
28 Feb 2019, 1:36 pm
Complications might arise, however,  due to  the  degree of consumer sophistication that courts tend to attribute to internet users, see Public Impact v Boston Consulting. [read post]
1 Feb 2019, 6:05 am
Emmerich and Robin Panovka, Wachtell, Lipton, Rosen & Katz, on Wednesday, January 30, 2019 Tags: Antitrust, CFIUS, Cross-border transactions, Disclosure, Distressed companies, International governance, Merger litigation, Mergers & acquisitions, SEC, Securities regulation, Taxation Corporations are People Too (And They Should Act Like It) Posted by Kent Greenfield (Boston College), on Wednesday, January 30,… [read post]
31 Jan 2019, 2:03 pm by Kevin LaCroix
John Reed Stark As cybersecurity has become an increasingly important consideration for all corporate operations, one of the most pernicious problems has been the rise of so-called “ransomware” attacks – that is, systems breaches in which hackers take control of corporate networks and demand ransom payments as a condition of unlocking the systems. [read post]