Features
Inside Cryptocurrency Pump-and-Dump Schemes
Since the inception of cryptocurrency as a widely traded asset, there has been increasing opportunity to make money through market manipulation, specifically through classic pump-and-dump and related fraudulent schemes, and more specifically CPDs.
Features
How to Protect a Website's Legal Identity
Internet site legal identity theft is becoming increasingly more sophisticated and common. If successful, a third party can use the theft of a legal identity to secure confidential information, harm marketing brand value, diminish good will and steal customers. Internet sites may employ legal, business, and technological means to protect their legal identities.
Features
How to Obtain Subpoenas for Identifying ISP Users
This article focuses on a recent federal court decision, to explain how the well-developed law provides plaintiffs asserting a wide range of claims with the ability to proceed while protecting ISPs and, correspondingly, how it ultimately means that defendants who otherwise could remain anonymous may have to defend themselves in court.
Features
NFTs and Virtual Patent Marking
Patent marking is an important step in the patent lifecycle as it is generally required to seek damages from infringers prior to the date the suit is filed. While virtual marking has somewhat reduced the overhead of marking, it suffers from the same problems all Internet-based evidence runs into in court: websites are ephemeral and have intermittent accessibility, as well as poor public logging of when information existed where, and for how long. NFTs on a digital blockchain could potentially overcome these hurdles, while still providing the benefits of virtual marking via websites.
Features
Protecting a Website's Legal Identity
Protecting an internet site's legal identity begins with the settled proposition that domain names are a form of personal property. The classification of a domain name as property allows the owner to register the domain name with the United States Trademark Office. Additionally, a domain name owner may state a claim for conversion against an entity that unlawfully interferes with the domain name property.
Features
Where Does Content Use Stand Now After Recent Rulings on 'Embedding' Foreshadow Circuit Split?
When and how can you display someone else's visual content on your website without running afoul of copyright law? When and how can someone else display your visual content? A recent ruling out of the Southern District of New York may upend the current paradigm.
Features
Legal Issues Around Tangible Asset NFTs
When a NFT is transferred to another, both the NFT and its copyright are automatically transferred. However, the intellectual property rights associated with the underlying asset may not necessarily be automatically transferred, unless stated otherwise.
Features
How to Fight Online Defamation
Internet tools are becoming more sophisticated in measuring the impact of disparaging and defamatory online statements, paving the way for affected business owners and celebrities to fight back by filing defamation suits seeking to recover damages for the harm to their reputation and brand value.
Features
Defamation Investigations: A Big Leap in Fighting Back
Internet tools are becoming more sophisticated in measuring the impact of online disparaging and defamatory statements, paving the way for affected business owners and celebrities to fight back by filing defamation suits seeking to recover damages for the harm to their reputation and brand value.
Features
SCOTUS Narrowly Interprets CFAA to Avoid Criminalizing 'Commonplace Computer Activity'
The Court held that only those who obtain information from particular areas of the computer which they are not authorized to access can be said to "exceed authorization," and the statute does not — as the government had argued — cover behavior where a person accesses information which he is authorized to access but does so for improper purposes.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Don't Sleep On Prohibitions on the Assignability of LeasesAttorneys advising commercial tenants on commercial lease documents should not sleep on prohibitions or other limitations on their client's rights to assign or transfer their interests in the leasehold estate. Assignment and transfer provisions are just as important as the base rent or any default clauses, especially in the era where tenants are searching for increased flexibility to maneuver in the hybrid working environment where the future of in-person use of real estate remains unclear.Read More ›
- Developments in Distressed LendingRecently, in two separate cases, secured lenders have received, as part of their adequate protection package, the right to obtain principal paydowns during a bankruptcy case.Read More ›
