Features
A Perfected Lien Is Trumped: Must It Be 'Use It or Lose It'?
As creditors well know, a lien holder must be vigilant in both perfecting and maintaining the perfection and priority of its lien. But even a creditor that properly maintains its lien may find that enforcement of (or more specifically, failing to enforce) that lien can affect priority.
Columns & Departments
Bit Parts
Deactivated Facebook Page of Band Not a "Use in Commerce"<br>New York Federal Court Declines Request From Elvis Presley Enterprises To Obtain Royalty Documents From Sony Music for Litigation Against Arista Music in Germany
Features
The Cloud and e-Discovery
Leveraging advanced technologies can empower corporate counsel and law firms alike to take control of the ongoing challenge that today's "information on demand" expectations present. When access, disaster recovery, scalability and security are paramount requirements, a migration to the cloud could be the most effective route to help ensure this is accomplished.
Features
10 Lessons from FTC Guidance on Data Security
Not if, but when." These simple words are enough to keep privacy officers, corporate counsel, compliance officers and IT managers up at night when faced with the reality that their network will at some point be breached. While there are no silver bullets to stop breaches from occurring, understanding and following legal actions brought by regulatory agencies and heeding security guidance they issue can go a long way.
Features
Does Adoption of Cloud Computing Shift Cyber Liability Risk?
The rapid adoption of cloud computing has attracted companies that seek to lower their information technology costs. At the same time, it is reported that there has been an increase in data loss and an increase in cyber-liability claims against companies. But the biggest vendors in the cloud computing industry want to push the risk of penetration of their systems onto their customers adopting the technology.
Features
When a Law Firm Partner Divorces
Going through a divorce can be tumultuous for everyone involved. When one of the parties is a partner in a law firm, those challenges are sometimes elevated for both the partner and the law firm.
Features
Information Sharing for the Information Age
As 2015 drew to a close, Congress agreed on a federal budget. That simple act, coming on the heels of a series of contentious continuing resolutions, was big news. But tucked away on page 694 of that 887-page bill was perhaps a more significant achievement. There Congress inserted, passed, and the President signed, the Cybersecurity Act of 2015.
Features
Gossip Column Has No Special Protection From Defamation Suit
Just because it's on "Page Six" of the <i>New York Post</i> doesn't mean it cannot be defamatory, according to the U.S. Court of Appeals for the Eleventh Circuit. The appellate court revived a defamation lawsuit by a member of The Fugees hip-hop group against the <i>Post</i> for an item in its "Page Six" gossip column, finding reasonable readers might take the story as true.
Features
CFPB Takes Step Into Cybersecurity Regulation
The Consumer Financial Protection Bureau (CFPB) has fired a shot across the bow of the burgeoning online-payment industry, taking an enforcement action this week that marked the agency's first foray into regulating cybersecurity.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Rights and Obligations In Patent LicensesThe owner of a commercially successful patent may have competing desires. On one hand, the patent owner wants to protect the patent and secure its maximum benefit; on the other hand, the patent owner wants to avoid enforcement litigation with competitors because it is expensive and puts the patent at risk.Read More ›
- Foreseeability as a Bar to Proof of Patent InfringementThe doctrine of equivalents is a rule of equity adopted more than 150 years ago by the U.S. Supreme Court. Prosecution history estoppel is a rule of equity that controls access to the doctrine. In May 2002, the Court was called upon to revisit the doctrine and the estoppel rule in <i>Festo Corp. v. Shoketsu Kinzoku Kogyo Kabushiki Co. Ltd.</i> Ultimately the Court reaffirmed the doctrine and expanded the estoppel rule, but not without inciting heated debate over the Court's rationale — especially since it included a new and controversial foreseeability test in its analysis for estoppel.Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›