Best in Law Blogs : The LexBlog Network : October 20, 2011
October 20, 2011
The LexBlog Network sees 161 posts and brings today’s roundup a nice bit of balance, as we have excellent posts on employment, privacy, intellectual property, tax law and immigration, amongst a couple others. Jason Shinn continues his push to be one of the best employment law bloggers on the Network while Bruce Khula, Kurt Wimmer, Andrew Stevenson and Mark Brennan all make their first appearance in a top ten.
- Knowing When to Hold ‘Em: Considerations for Getting the Preservation Obligation Right in Employment Discrimination Claims – West Bloomfield lawyer Jason Shinn of E-Business Counsel on his blog, Michigan Employment Law Advisor
- SEC Guidance to Public Companies: Evaluate and Disclose Cybersecurity Risks – Boston attorney Cynthia LaRose of Mintz Levin on the firm’s blog, Privacy & Security Matters
- Sixth Circuit Clerks and the U.S. Supreme Court – Cleveland lawyer Bruce Khula of Squire Sanders on the Sixth Circuit Appellate Blog
- Dilbert Advocates Trademark Shape Depletion Theory – Minneapolis lawyer Steve Baird of Winthrop & Weinstine on the firm’s Duets Blog
- Eminent Domain Law to be Used for Testing in Sacramento-San Joaquin Delta – Irvine lawyer Brad Kuhn of Nossaman on the firm’s blog, California Eminent Domain Report
- ECPA Turns 25 — Legislators, Industry Groups Call for Reform – Washington, DC attorney Kurt Wimmer of Covington & Burling on the firm’s blog, Inside Privacy
- The Big Apple Goes to the Market for Online Trading Revenue – The blogging lawyers and attorneys in the Sutherland’s State and Local Tax team on the firm’s blog, SALT Online
- Five AIA Construction Documents Go Green – Construction lawyer Matt DeVries of the Best Practices Construction Law Blog
- Mandatory E-Verify and Workplace Immigration Enforcement – Seattle lawyer Andrew Stevenson of Lane Powell on the firm’s blog, Immigration Edge
- New Guidelines Released for Mobile App Privacy Policies – Washington, DC lawyer Mark Brennan of Hogan Lovells on their blog, Chronicle of Data Protection
Posted in: