Features
DE Supreme Court Eases Social Media Authentication
Social media postings can be submitted as trial evidence as long as the party introducing the evidence can demonstrate to the judge that a jury could reasonably conclude the postings are authentic, the Delaware Supreme Court has ruled.
Features
Statistical Sampling
The focus on proportionality in high-profile cases such as <i>Apple v. Samsung</i>, coupled with the recent proposed amendments to the Federal Rules of Civil Procedure are driving attorneys to reevaluate the methods by which they uncover crucial electronic evidence for a case.
Features
Best Practices for Comprehensive Searchability
Most law firms now proudly proclaim that they have implemented efficient and secure document management systems, systems in which they have invested significant dollars and even more in "sweat equity." The end goal of these systems is to ensure that all documents are stored securely, and perhaps more importantly, can be found quickly and easily.
Features
Content Owners' Pursuit of Secondary Infringement Claims
Secondary liability can be imposed on an ISP or distributor of a product used to commit infringement based upon claims of contributory infringement, inducement infringement or vicarious infringement. The contributory and inducement claims both focus on a defendant's contribution to the infringement and require that the defendant knows that direct infringement is occurring. These related claims, which provide independent ways to attack secondary infringement, differ in important respects.
Features
Pushing the Technology Envelope in and Out of the Courtroom
Technological advancements have dramatically improved the speed, capabilities and, in most cases, the cost-effectiveness in which deposition, discovery and pre-trial services are provided. Companies that have embraced the latest developments in jury research and selection technology ' particularly social media monitoring tools ' are best situated to thrive in the current environment.
Columns & Departments
IP News
Supreme Court Overturns Burden-Shift in Non-Infringement Judgment <br>Federal Circuit Clarifies Rules for Patent Term Extension<br>Federal Circuit Confirms That All Members of a Priority Chain Must Recite Full Lineage
Features
A Victory for Forum-Selection Clauses
A recent Supreme Court decision overturns both the United States District Court for the District of Western Texas and the U.S. Court of Appeals for the Fifth Circuit.
Columns & Departments
The Leasing Hotline
Analysis of a key case.
Features
<i>Soul Men</i> Ruling Shows Shift To Transformative Use Test
Celebrities often turn to the Lanham Act and state right of publicity laws to protect against exploitation of their name, image or voice in connection with the promotion of products or services. The U.S. Court of Appeals for the Sixth Circuit recently considered both Lanham Act and right of publicity claims in an action that pitted a Grammy winning musical artist against a major motion picture studio over the alleged use of the musician's likeness in a movie.
Features
Is the Internet a Safer Place for Content Owners?
Many battles have been fought in courtrooms across the United States over the unauthorized Internet sharing of copyrighted books, music, movies and television shows. These include disputes over increasingly more sophisticated software products and websites that appear designed to respond to the latest court rulings over the scope of the DMCA "safe harbor" protections and the elements required to establish secondary copyright infringement liability.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- Inferring Dishonesty: The Fifth Amendment and Fidelity CoverageDishonest employees always have posed a problem for businesses. The average business may lose 6% of its annual revenues to employee fraud, and cumulatively the impact of employee theft on the economy is estimated to be $600 billion annually. <i>See</i> Association of Certified Fraud Examiners ("ACFE"), 2002 Report to the Nation on Occupational Fraud & Abuse, at ii, 4 (2002), available at <i>www.cfenet.com/publications/rttn.asp.</i> Although the average loss through employee embezzlement is $25,000, where computerized financial records or transactions are involved, the average loss increases nearly twentyfold. <i>See</i> National White Collar Crime Center, <i>WCC Issue: Embezzlement/Employee Theft,</i> at 2 (2002), available at <i>http://nw3c.org/downloads/Computer_Crime_Weapon.pdf.</i>Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›