Features

How to Obtain Subpoenas for Identifying ISP Users
This article focuses on a recent federal court decision, to explain how the well-developed law provides plaintiffs asserting a wide range of claims with the ability to proceed while protecting ISPs and, correspondingly, how it ultimately means that defendants who otherwise could remain anonymous may have to defend themselves in court.
Features

NFTs and Virtual Patent Marking
Patent marking is an important step in the patent lifecycle as it is generally required to seek damages from infringers prior to the date the suit is filed. While virtual marking has somewhat reduced the overhead of marking, it suffers from the same problems all Internet-based evidence runs into in court: websites are ephemeral and have intermittent accessibility, as well as poor public logging of when information existed where, and for how long. NFTs on a digital blockchain could potentially overcome these hurdles, while still providing the benefits of virtual marking via websites.
Features

Protecting a Website's Legal Identity
Protecting an internet site's legal identity begins with the settled proposition that domain names are a form of personal property. The classification of a domain name as property allows the owner to register the domain name with the United States Trademark Office. Additionally, a domain name owner may state a claim for conversion against an entity that unlawfully interferes with the domain name property.
Features

Where Does Content Use Stand Now After Recent Rulings on 'Embedding' Foreshadow Circuit Split?
When and how can you display someone else's visual content on your website without running afoul of copyright law? When and how can someone else display your visual content? A recent ruling out of the Southern District of New York may upend the current paradigm.
Features

Legal Issues Around Tangible Asset NFTs
When a NFT is transferred to another, both the NFT and its copyright are automatically transferred. However, the intellectual property rights associated with the underlying asset may not necessarily be automatically transferred, unless stated otherwise.
Features

How to Fight Online Defamation
Internet tools are becoming more sophisticated in measuring the impact of disparaging and defamatory online statements, paving the way for affected business owners and celebrities to fight back by filing defamation suits seeking to recover damages for the harm to their reputation and brand value.
Features

Defamation Investigations: A Big Leap in Fighting Back
Internet tools are becoming more sophisticated in measuring the impact of online disparaging and defamatory statements, paving the way for affected business owners and celebrities to fight back by filing defamation suits seeking to recover damages for the harm to their reputation and brand value.
Features

SCOTUS Narrowly Interprets CFAA to Avoid Criminalizing 'Commonplace Computer Activity'
The Court held that only those who obtain information from particular areas of the computer which they are not authorized to access can be said to "exceed authorization," and the statute does not — as the government had argued — cover behavior where a person accesses information which he is authorized to access but does so for improper purposes.
Features

Supreme Court Narrowly Interprets CFAA to Avoid Criminalizing 'Commonplace Computer Activity'
The Court held that only those who obtain information from particular areas of the computer which they are not authorized to access can be said to "exceed authorization."
Features

3d Circuit Hears Case on Interaction of Publicity Rights and the CDA
Likening his client's claim to that of an athlete with a monetizable image, an attorney representing TV reporter Karen Hepp, who is suing social media websites over misuse of her likeness, recently argued to the U.S. Court of Appeals for the Third Circuit that the case should fit a narrow exception to a federal law that bars suits against online content providers.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- UCC ' 1-203: A Few Lesser (and Not Always Lessor) Known PitfallsThis article discussed the unexpected (and, for a lessor, sometimes unfortunate) consequences that can result by not understanding all the nuances of UCC ' 1-203.Read More ›
- Players On the MoveA look at moves among attorneys, law firms, companies and other players in entertainment law.Read More ›