We use cookies to customise content for your subscription and for analytics.
If you continue to browse Lexology, we will assume that you are happy to receive all our cookies. For further information please read our Cookie Policy.
Results 1 to 5 of 69
Most popular |Most recent


Earnouts: Bridging the Valuation Gap in Mergers and Acquisitions

USA - April 10 2017 An earnout is a mechanism used in business acquisitions that allows seller to receive additional post-closing payments over time depending on the...

Steven C. Papkin, Carl R. Johnston.


Telling a tall tale: reports of demise of privacy obligations are greatly exaggerated

USA - April 3 2017 There has been a good deal of public discussion of pending legislative action to relieve internet service providers of the obligation to obtain...

Kimberly Dempsey Booher.


Key Employee Going to a Competitor - Managing Trade Secret and other Risk

USA - March 28 2017 Your key employee walks in (or sends an e-mail after disappearing) and says that they are leaving to join (or start) a competitor. What now? There...

R. Mark Halligan, Anthony J. DoVale, Michael S. Khoury, Deborah L. Fletcher.


Borrowing Against IP - Additional Financial Flexibility

USA - March 28 2017 One asset which is under-appreciated by both borrowers and lenders is intellectual property, particularly patents and trademark registrations. Such...

R. Mark Halligan, Anthony J. DoVale, Michael S. Khoury, Deborah L. Fletcher.


Privacy and Information Security - Cyber Incident Response Planning

USA - March 28 2017 Articles and notices about data breaches have become commonplace, but the actions required by companies in the event of such an incident are...

R. Mark Halligan, Anthony J. DoVale, Michael S. Khoury, Deborah L. Fletcher.