Columns & Departments
Case Notes
Miami Agrees to Settle Costly Island Development Dispute After Losing Key Ruling Breach of Lease By Subsidiary Does Not Justify Piercing Corporate Veil Tenant Not Entitled to Preliminary Injunction Requiring Landlord to Co-Operate
Features
Court of Appeals Upholds Rent Overcharge Class Action
Can tenants maintain a class action against landlords asserting a pattern and practice of illegal conduct when the various plaintiff tenants have been injured by different forms of allegedly wrongful conduct?
Columns & Departments
Real Property Law
Statute of Limitations Did Not Bar Foreclosure Action Nuisance Claim Arising Out of Environmental Remediation Not Barred By Statute of Limitations Mortgage Contingency Clause Did Not Give Buyer Right to Cancel Mortgagor Did Not Prove Damages Arising Out of RESPA Violation Questions of Fact Preclude Summary Judgment on Whether Adverse Possession Extinguished Easement
Features
Patenting Diagnostic Tests: Can We Expect Changes?
This article discusses the jurisprudence applied to determining patent eligibility of claims for diagnostic methods, and the expectation for changes in analysis of patent eligibility under §101 in the near future.
Features
Safeguarding Your Intellectual Property
Documents are the lifeblood of any law firm. The documents that a firm produces are its greatest asset, especially the intellectual property — trade secrets, patent information, etc. — contained in those documents, yet firms historically have not made sufficient efforts to safeguard those documents from both internal and external threats.
Features
When Are Short Phrases in Songs Protectable?
It's a common fact pattern: A songwriter alleges that another songwriter has infringed the lyrics of Song A by using a similar short phrase, frequently a current slang phrase, in the lyrics of Song B. Claims like this do not often succeed because "words and short phrases such as names, titles, and slogans" are "not subject to copyright."
Columns & Departments
IP News
Federal Circuit Holds PTAB Judges Unconstitutional, Constructs a Fix—But Not All Judges Agree on What Happens Next
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- China Finalizes New Regulations to Relax Personal Data Exports from ChinaNearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.Read More ›
- 10 Steps Legal Departments Should Be Taking to Prepare for the SEC's Newly Adopted Cybersecurity Risk Governance Rule for Public CompaniesBy readying your company's cybersecurity program now to comply with the SEC's cyber rules, you will also arm your company with a better defense against cyberthreat actors, reduce the reputational harm that comes along with a cybersecurity incident and increase investor confidence in the company's cybersecurity program.Read More ›
