Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Commercial Law

Columns & Departments

Upcoming Event Image

Upcoming Event

ALM Staff & Law Journal Newsletters

TexasBarCLE 24th Annual Entertainment Law Institute

Columns & Departments

Bit Parts Image

Bit Parts

Stan Soocher

California Right of Publicity Claims Can Be Assigned<br>Invasion of Privacy Suit Against Greenberg Glusker Law Firm Found Time-Barred<br>Whither the Transformative Use Defense in Copyright Infringement Cases?

Features

Patent Reform Is Coming, but Not From Congress Image

Patent Reform Is Coming, but Not From Congress

Christian Mammen

It's well established that the number of lawsuits filed by patent trolls in the last decade has increased dramatically. This increase comes at considerable expense to defendants of all stripes. But as widely reviled as this trend may be among operating companies that often find themselves as defendants in patent troll litigation, legislation that would curb this practice has made little progress.

Columns & Departments

IP News Image

IP News

Howard J. Shire & Wyatt Delfino

Federal Circuit Applies <i>Alice</i> to Invalidate Online Transaction Patent <br>Federal Circuit Finds 'Unobtrusive' and 'Does Not Distract' Indefinite<br>Federal Circuit: In Hatch-Waxman, Infringement Based Only on Final ANDA Product

Features

Collecting Social Security Numbers Image

Collecting Social Security Numbers

Nicole Pszczolkowski & L. Elise Dieterich

In the first half of 2014, at least 96 significant data breaches were reported, compromising more than 2.2 million records. Of these breaches, at least 46 involved records that may have contained Social Security Numbers (SSNs). What the affected businesses may not know is that the mere collection of SSNs may have put them in violation of state laws, in addition to the liability they may now face for having failed to protect the SSN information.

Columns & Departments

Court Watch Image

Court Watch

Cynthia M. Klaus & Susan E. Tegt

Franchisor's Control over System Uniformity Insufficient to Show Vicarious Liability <br>Printed Names Without Signatures Satisfy Requirement That Personal Guaranty Be Signed

Features

Social Media Invades and Modernizes Employment Practices Image

Social Media Invades and Modernizes Employment Practices

Morey Raiskin & Celeste Thacker

For employers, social media sites present a potential treasure trove of information on applicants, but mining this information for use in recruiting, hiring, firing and monitoring of employees is fraught with risk. Nonetheless, some studies show that 40% of employers search social media during the hiring process. While there are not currently any laws in the United States forbidding employers from gleaning information from social media, improper use can get them into trouble.

Features

Back to School Image

Back to School

Erin Winters

With schools back in session, now is the time for employers to review hiring, payment and scheduling practices for workers under the age of 18. The myriad federal and state child labor laws that employers must heed range from work permit requirements to the hours and type of work performed, all of which vary based on an employee's age and whether school is in session.

Features

Intercreditor Agreements Image

Intercreditor Agreements

Sean Gillen

This is the fifth article in a series covering various aspects of intercreditor agreements.

Features

Law Firm Security Pressures Alleviated With Financial Strategies Image

Law Firm Security Pressures Alleviated With Financial Strategies

Scott McFetters

We know the consumer-industry stories of hackers infiltrating Target and, more recently, Home Depot:

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • 'Customary Operations' or A Vacant Building?
    Many times, courts are faced with the question of whether a loss location is 'vacant' under a commercial property policy when trying to determine if the building owner or lessee is conducting customary operations. This article explores various decisions across the United States as to what is considered 'customary operations,' thereby rendering the property 'vacant.'
    Read More ›
  • Bankruptcy Sales: Finding a Diamond In the Rough
    There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
    Read More ›
  • Authorship and Copyright In Hybrid AI-Human Collaborative Works
    The United States Copyright Office recently issued a letter ruling on the copyrightability of Kristina Kashtanova's comic book-like work, Zarya of the Dawn. The Kashtanova ruling indicates that the Copyright Office's determination of copyrightability of works involving use of AI will rely on whether the author is able to control and foresee with some measure of predictability the output of the authorial process
    Read More ›