Blog

The Art of Preparation: Cross-Examining Difficult Experts
Category: Litigation
An expert witness may be difficult for a variety of reasons. The expert may be likeable and persuasive to the jury. The expert may be arrogant and refuse to acknowledge even obvious points. The expert may be openly combative and aggressive. But no matter why the expert is difficult, he or she…
Read Full Post »
Storage Tank Enforcement/Remediation: Connecticut Superior Court Addresses Penalties for Alleged Violations
Category: Arkansas Environmental, Energy, and Water Law
The Superior Court of Connecticut (“Court”) addressed in a January 22nd Memorandum of Decision (“MOD”) an enforcement action by the Connecticut Department of Energy and Environmental Protection (“DEEP”) seeking the assessment of penalties against a Berlin, Connecticut service station owner…
Read Full Post »
2020 Arkansas Solid Waste Conference: Arkansas Chapter - Solid Waste Association of North America Schedules Annual Conference
Category: Arkansas Environmental, Energy, and Water Law
The Arkansas Chapter of the Solid Waste Association of North America (“SWANA”) has scheduled its 2020 annual Arkansas Solid Waste Conference (“Conference”). The Conference will be held from April 7th – April 9th at the Holiday Inn Northwest Arkansas in Springdale, Arkansas. The Arkansas Chapter of…
Read Full Post »
Lower Umatilla Basin (Oregon)/Safe Drinking Water Act: Food and Water Watch Petition for Emergency Action Submitted to the U.S. Environmental Protection Agency
Category: Arkansas Environmental, Energy, and Water Law
Food & Water Watch (“F&W”) and a number of other organizations submitted a petition to the United States Environmental Protection Agency (“EPA”) titled: Petition for Emergency Action Pursuant to the Safe Drinking Water Act § 1431, 42 U.S.C. § 300i to Protect Citizens of the Lower Umatilla Basin in…
Read Full Post »
Fueling the Fire: How Extortion Has Changed the Face of Data Breaches
Category: Information Privacy, Security and Data Rights
Ransomware attackers typically encrypt victims’ data and demand ransom in exchange for the decryption keys. Ransomware is not a new cybercriminal activity. In fact, ransomware attacks are over 30 years old.[1] However, around the mid-2010’s, ransomware attacks really took off, growing in…
Read Full Post »
< Newer Page 990/1318 Older >
The Between the Lines blog is made available by Mitchell, Williams, Selig, Gates & Woodyard, P.L.L.C. and the law firm publisher. The blog site is for educational purposes only, as well as to give general information and a general understanding of the law. This blog is not intended to provide specific legal advice. Use of this blog site does not create an attorney client relationship between you and Mitchell Williams or the blog site publisher. The Between the Lines blog site should not be used as a substitute for legal advice from a licensed professional attorney in your state.