Columns & Departments
Cameo Clips
Texas Court of Appeals Upholds Ruling for Lawyer Defendant in Malpractice Suit over TV Network Stock Dispute<br>TV Executive Can't Get Punitive Damages from Alleged Fraud in Hiring
Features
Laying a Foundation for Integrated e-Discovery Systems
Typically, the production of data in litigation involves a series of disconnected actions involving several corporate or cloud-based systems. These disassociated e-discovery activities ' identify, preserve, collect, and track (IPCT) ' are then feed into a downstream set of processing, review, and production (PRP) steps often hosted outside the corporate firewall. Fortunately, technology advances are helping counsel and client alike to integrate systems and streamline processes both inside and across the firewall.
Columns & Departments
Court Watch
Rare Franchisee Judicial Victory Sets Dangerous Precedent for Franchisors
Features
e-Commerce Website Methods Are Patent Eligible
On Dec. 5, 2014, a divided Federal Circuit panel held that claims directed to systems and methods of generating a composite Web page combining certain visual elements of a "host" website with content of a third-party merchant were "necessarily rooted in computer technology in order to overcome a problem specifically arising in the realm of computer networks," and, therefore, were patent-eligible. However, the court cautioned that not all claims addressing Internet-centric challenges are patent-eligible.
Features
Supreme Court Rules Trademark Tacking Is a Question of Fact
Priority of use is a hallmark of trademark law. Over the years, lower courts have recognized a doctrine called "tacking," under which a trademark owner may "clothe a new mark with the priority position of an older mark." The key to the tacking doctrine is that the new trademark must "create the same, continuing commercial impression" as the old mark. In <i>Hana Financial</i>, the U.S. Supreme Court considered the question and settled the circuit split, holding that tacking is a question for the jury.
Features
Ethics and Obligations Regarding Global Big Data
It is a basic tenet of professional responsibility that lawyers obtain sufficient proficiency to ensure competent representation of their clients. The challenge in today's world of Big Data and corporate globalization and outsourcing of IT infrastructure is that the level of technological proficiency required is not always clear. Understanding your obligations and establishing defensible processes will be necessary to fully demonstrate competence in discovery should an issue arise.
Features
Information Security
For the past few years, considerable public discussion about the need for law firms to address information security, or InfoSec, issues with their clients. InfoSec can hardly qualify as the next big thing. However, the Sony story has brought the issue front and center and, as we get further into 2015, we can be sure that the issue will only grow.
Features
Can Computers Practice Law?
Can computers practice law? Many are inclined to say yes when using them affects us in so many ways. When scanning the pages of LJN's Legal Tech Newsletter , we learn a good deal about the use of computers in the practice of law, but what I am really asking here is how far can ' or will ' we go to automate dispute resolution?
Features
Is Band's Name Too Offensive For Trademark Approval?
Offensive band names are a staple of rock music. Rock fans of a certain age will remember The Dead Kennedys of punk rock fame. The Butthole Surfers, Pussy Galore and Dying Fetus developed substantial followings despite, or because of, their outrageous names. Oregon dance rock band The Slants is another that seems determined to provoke.
Columns & Departments
IP News
S. Ct.: Clear Error Standard Must Now Be Applied To District Court's Factual Claim Construction Findings
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Enhanced Oversight of Search Warrants and Title III WiretapsSearch warrants and wiretaps were once used primarily to investigate organized crime, drug dealing and terrorism. In recent years, however, prosecutors have employed these tools increasingly in the context of white-collar crime to the point where it is now commonplace.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The Right to Associate in the DefenseThe "right to associate" permits the insurer to work with the insured to investigate, defend, or settle a claim. Such partnerships protect the insurer and can prove beneficial to the insured's underlying case and ultimate exposure.Read More ›
- DOJ's Cyber Fraud Initiative: A Wake-up Call That Keeps RingingDOJ's Cyber Fraud Initiative has been a wake-up call for companies to prioritize cybersecurity and adhere to stringent standards. By leveraging the FCA, DOJ has used a powerful enforcement tool to target a wide range of cybersecurity failures and misrepresentations. The increasing focus on cybersecurity by enforcement agencies means that robust cybersecurity practices are becoming a standard expectation, not just a best practice.Read More ›