Features
Sixth Circuit's Decision on Privacy Claims over Data Breaches
Data breaches such as the one Yahoo recently revealed (500 million accounts!) get the big headlines. In response, large companies double down on their efforts to protect the security of their data. But small to midsize businesses often fail to appreciate the risk of a data breach to their own business.
Features
Software and Business Method Inventions After <i>Alice</i>
As important as software and business method inventions are in the new digital economy, it is often unclear whether they can be patented. This uncertainty is largely due to a legal rule that “abstract ideas” are not eligible for patent protection, which is based on a long line of U.S. Supreme Court cases, with <i>Alice Corporation v. CLS Bank</i> being the most recent and influential.
Features
Drafting Film Production Compensation Clauses In Light of State Tax Credit Requirements
Compensation provisions in entertainment contracts are in one or two subparagraphs. To simplify drafting and to use “plain English,” the compensation provisions often contain introductory, governing language along the lines of: “In full and complete consideration for entering into and performing all of the terms hereof.” However, is such a “plain English” approach always a “best practice”?
Features
<i>Decision of Note</i>: Second Circuit Rules on e-Book Sample in Digital Locker
The U.S. Court of Appeals for the Second Circuit decided that an agreement between a book author and a publisher allowed a customer of distributor Barnes & Noble to retain a sample of the book in the “digital locker” the distributor provided to the customer.
Features
Ninth Circuit Examines Copyright Liability Merch Photos Case
When, as is often the case, actual copyright damages are difficult to prove, statutory damages may provide the best option for recovery. Recently, in <i>Friedman v. Live Nation Merchandise</i>, the U.S. Court of Appeals for the Ninth Circuit considered, among other things, two issues greatly affecting the amount of statutory copyright damages: 1) willfulness; and 2) the number of separate awards available for downstream infringements.
Features
Seizure Issues To Consider in Federal Trade Secrets Act
Both before and after the passage of the Defend Trade Secrets Act (DTSA) in May 2016, which created a federal civil cause of action for trade secrets misappropriation, much ink was spilled over the controversial “seizure” provision.
Features
Stepping into the Shoes of the IRS to Pursue Otherwise Time-Barred Avoidance Actions Under Fraudulent Transfer Statutes
One of the rare legal issues in which bankruptcy practitioners usually are able to speak to clients in absolute terms to provide clear legal advice is the limitations period concerning the pursuit of avoidable transfers in bankruptcy proceedings.
Features
Challenges in Solar Equipment Finance
Growth in solar-generation capacity has not been evenly distributed across the country, however, as some states' policies and laws are solar-friendly, while those in other states pose barriers. One such barrier in many states is the lack of access to financing.<p><b><i>Part One of a Two-Part Article</i></b>
Features
Photo Agency's Suit Against <i>Oh No They Didn't!</i> At Ninth Circuit
A photo agency that sued the owner of online tabloid Oh No They Didn't! for copyright infringement is hoping to reverse a ruling that threw out its case, prompting Pinterest and others to weigh in and argue that reviving the case could erode legal protections afforded to Internet service providers.
Features
The Queen Is Dead, Long Live the Queen?
The automatic stay of 11 U.S.C. § 362 is one of the most important principles of bankruptcy law. It provides crucial breathing space for the debtor to reorganize or liquidate, and avoids the piecemeal dismemberment of the estate's assets. However, in rare instances, courts have extended stay protection to non-debtors through 11 USC § 105. This is considered extraordinary relief reserved for unusual circumstances, and may be analogized to the inherent power of federal courts under their general equity powers.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- China Finalizes New Regulations to Relax Personal Data Exports from ChinaNearly six months after the Cyberspace Administration of China (CAC) was first introduced for public consultation, the much-awaited final rules on Regulating and Facilitating Cross-border Data Flows were published and came into effect on March 22, 2024. The New Regulations largely repeat the Draft Regulations, but now have further relaxed personal data exports from China.Read More ›
- 10 Steps Legal Departments Should Be Taking to Prepare for the SEC's Newly Adopted Cybersecurity Risk Governance Rule for Public CompaniesBy readying your company's cybersecurity program now to comply with the SEC's cyber rules, you will also arm your company with a better defense against cyberthreat actors, reduce the reputational harm that comes along with a cybersecurity incident and increase investor confidence in the company's cybersecurity program.Read More ›
