Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Litigation

Features

DE Supreme Court Eases Social Media Authentication Image

DE Supreme Court Eases Social Media Authentication

Jeff Mordock

Social media postings can be submitted as trial evidence as long as the party introducing the evidence can demonstrate to the judge that a jury could reasonably conclude the postings are authentic, the Delaware Supreme Court has ruled.

Features

Statistical Sampling Image

Statistical Sampling

Howard Edson & Dean Gaida

The focus on proportionality in high-profile cases such as <i>Apple v. Samsung</i>, coupled with the recent proposed amendments to the Federal Rules of Civil Procedure are driving attorneys to reevaluate the methods by which they uncover crucial electronic evidence for a case.

Features

Best Practices for Comprehensive Searchability Image

Best Practices for Comprehensive Searchability

Dean Sappey

Most law firms now proudly proclaim that they have implemented efficient and secure document management systems, systems in which they have invested significant dollars and even more in "sweat equity." The end goal of these systems is to ensure that all documents are stored securely, and perhaps more importantly, can be found quickly and easily.

Features

Content Owners' Pursuit of Secondary Infringement Claims Image

Content Owners' Pursuit of Secondary Infringement Claims

Alan R. Friedman

Secondary liability can be imposed on an ISP or distributor of a product used to commit infringement based upon claims of contributory infringement, inducement infringement or vicarious infringement. The contributory and inducement claims both focus on a defendant's contribution to the infringement and require that the defendant knows that direct infringement is occurring. These related claims, which provide independent ways to attack secondary infringement, differ in important respects.

Features

Pushing the Technology Envelope in and Out of the Courtroom Image

Pushing the Technology Envelope in and Out of the Courtroom

Peter Hecht

Technological advancements have dramatically improved the speed, capabilities and, in most cases, the cost-effectiveness in which deposition, discovery and pre-trial services are provided. Companies that have embraced the latest developments in jury research and selection technology ' particularly social media monitoring tools ' are best situated to thrive in the current environment.

Columns & Departments

IP News Image

IP News

Howard J. Shire & Wyatt Delfino

Supreme Court Overturns Burden-Shift in Non-Infringement Judgment <br>Federal Circuit Clarifies Rules for Patent Term Extension<br>Federal Circuit Confirms That All Members of a Priority Chain Must Recite Full Lineage

Features

A Victory for Forum-Selection Clauses Image

A Victory for Forum-Selection Clauses

Lewis J. Cohn & John T. Precobb

A recent Supreme Court decision overturns both the United States District Court for the District of Western Texas and the U.S. Court of Appeals for the Fifth Circuit.

Columns & Departments

The Leasing Hotline Image

The Leasing Hotline

ALM Staff & Law Journal Newsletters

Analysis of a key case.

Features

<i>Soul Men</i> Ruling Shows Shift To Transformative Use Test Image

<i>Soul Men</i> Ruling Shows Shift To Transformative Use Test

Keola R. Whittaker

Celebrities often turn to the Lanham Act and state right of publicity laws to protect against exploitation of their name, image or voice in connection with the promotion of products or services. The U.S. Court of Appeals for the Sixth Circuit recently considered both Lanham Act and right of publicity claims in an action that pitted a Grammy winning musical artist against a major motion picture studio over the alleged use of the musician's likeness in a movie.

Features

Is the Internet a Safer Place for Content Owners? Image

Is the Internet a Safer Place for Content Owners?

Alan R. Friedman

Many battles have been fought in courtrooms across the United States over the unauthorized Internet sharing of copyrighted books, music, movies and television shows. These include disputes over increasingly more sophisticated software products and websites that appear designed to respond to the latest court rulings over the scope of the DMCA "safe harbor" protections and the elements required to establish secondary copyright infringement liability.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Legal Possession: What Does It Mean?
    Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›