Features
Video and Audio Recording in Domestic Cases
Is there a legal difference between an audio and video recording of someone, compared with a video recording of someone? Moreover, if the recording is not sent electronically, but stored at the location of the recorded individual, is it still a violation of the wiretapping statute?
Features
Insurance Coverage in Consumer Class Actions
The requirements placed on corporate America as a result of increasingly labyrinthine consumer protection laws have created significant new potential liabilities, often in the form of statutorily mandated damages.
Features
Quarterly State Compliance Review
A look at some legislation of interest to corporate lawyers that went into effect during the last quarter, including amendments to Delaware's corporation, LLC and LP laws. Also, three recent decisions dealing with the inspection of books and records.
Features
Contractually Amendable Retiree Health and Welfare Benefits
In a controversial decision, the Third Circuit has ruled that a debtor must comply with the stringent procedural and substantive requirements of 11 U.S.C. ' 1114 to terminate retiree health and welfare benefits that the debtor contractually retained the right to modify at will.
Features
<b><i>Looking Forward, Looking Back:</b></i> Supreme Court's <i>Rear Window</i> Ruling 20 Years Later
2010 is the 20th anniversary of a landmark U.S. Supreme Court decision that dealt with the copyright renewal-rights dilemma. The case centered on whether actor James Stewart and director Alfred Hitchcock could continue to exploit their classic-thriller movie Rear Window, which was based on the short story "It Had to Be Murder" by Cornell Woolrich.
Features
League Impact on the Sports Team Bankruptcy Process
As more beleaguered team owners seek refuge in bankruptcy proceedings, the resulting clash of league interests with fundamental principles of bankruptcy law will result in the development of novel legal and practical solutions for financially distressed sports franchises.
Features
Abusive Internet Social Networking Yields Infringement
As with domain names, social networking user names are often an extension of a person's or an organization's identity. Businesses, for example, use social networking identities to promote themselves as a source of goods and services. And the flip side of that coin is that abusive use of social networking user names allows a third party to benefit from the goodwill by-product endorsement. But here's the problem: Such abusive behavior constitutes intellectual property infringement.
Features
Plaintiff in Casino Suit Craps Out in Venue Decision
A New Jersey resident unsuccessfully sought to keep his slip-and-fall case in Philadelphia Common Pleas Court by arguing that an Atlantic City casino's Internet advertising within Pennsylvania established the state's personal jurisdiction over alleged negligence by the casino.
Features
Case Briefs
Highlights of the latest insurance cases from around the country.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- 10 Steps Legal Departments Should Be Taking to Prepare for the SEC's Newly Adopted Cybersecurity Risk Governance Rule for Public CompaniesBy readying your company's cybersecurity program now to comply with the SEC's cyber rules, you will also arm your company with a better defense against cyberthreat actors, reduce the reputational harm that comes along with a cybersecurity incident and increase investor confidence in the company's cybersecurity program.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- China Finalizes New Regulations to Relax Personal Data Exports from ChinaNearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.Read More ›
