Features
Retail Tenants Need to ZIP Up Their Class-Action Defenses in CA
Retail tenants in California ' and perhaps those in other states as well ' that collect ZIP Codes may very well find themselves the subject of putative class actions, the penalties for which could be substantial.
Features
Foreclosure Crisis Presents Challenges for Lenders When Homeowners and Condo Associations Are Involved
With foreclosure filings at unprecedented levels, associations are facing high assessment delinquency rates since generally when a homeowner stops paying his or her mortgage, he or she also ceases paying any assessments. A look at recent litigation.
Features
Court Restricts Bankruptcy Court Jurisdiction in Stern v. Marshall
The Supreme Court's 5-to-4 decision in <i>Stern v. Marshall</i> definitively upsets a quarter-century's jurisdiction by bankruptcy courts over a large set of actions.
Net News
Winklevoss Twins Drop Facebook Supreme Court Bid<br>Updated Minor 'Sexting' Law Moves Through NJ Legislature
Third Circuit: Students' Off-Campus Use of MySpace Not Punishable
In a pair of cutting-edge First Amendment cases, the Third U.S. Circuit Court of Appeals has ruled that school officials cannot discipline students for ridiculing their principals on MySpace during their hours away from school.
Features
Understanding and Mitigating the Legal Risks of Cloud Computing
There can be significant economic efficiencies realized by moving to the cloud. However there are also potential risks involved if an entity does not adequately consider the information governance implications, especially those involving electronic discovery.
From Dot-Com to Dot-Whatever
The organization that governs the Domain Name System, ICANN, voted late last month to launch the new application process for an unlimited number of new top-level domains, despite lingering doubts and objections from trademark owners and others.
Features
Waging Trademark War Against 'i-Pirates'
Trademark infringers have preyed on the fertile software marketplaces opened by companies like Apple and Google by offering apps for download under names that are identical or confusingly similar to other well-known brand names. These online trademark bandits are effectively engaging in a form of "i-piracy," whereby they attempt to profit from the goodwill associated with established trademarks by pirating those marks for use in their own knock-off apps.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Beach Boys Songs Written Decades Ago Triggered Current Quarrel With LawyersThere's current litigation in the ongoing Beach Boys litigation saga. A lawsuit filed in 2019 against Nevada residents Mike Love and his wife Jacquelyne in the U.S. District Court for the District of Nevada that alleges inaccurate payment by the Loves under the retainer agreement and seeks $84.5 million in damages.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- The Settlement Privilege and the Threat of Legal ActionPart One of this article considers the issue of when a threat to litigate encased by a settlement demand raises the specter of extortion, and the extent to which a potentially extortionate settlement communication should be outside the scope of the privilege.Read More ›