Features
Backup Protection and Continuity Keep Firms Running
Firms of every size and in every geographic area must protect their electronic data and be prepared for potential IT disasters.
Sorting Out Vested Rights and Non-Conforming Uses
Pre-existing non-conforming use doctrine and "vested rights" doctrine are two different, but related, mechanisms. The Court of Appeals recently decided a case in which the landowner raised both doctrines.
Virtualization Technology in the Law Firm
Virtualization is one of <i>the</i> IT buzzwords in 2010. One of the greatest advantages that virtualization brings is the ability to minimize the complexity of the end-user computing environment for the firm's attorneys and support staff.
Features
Third Circuit Asked to Clarify Student Internet Speech Cases
Cutting-edge questions in the First Amendment arena have recently stemmed from clashes between students and school districts over the limits ' if any ' that may be imposed on speech posted on social networking sites like MySpace and Facebook. Now lawyers on both sides of the issue are urging the Third U.S. Circuit Court of Appeals to vacate two recent ' and seemingly conflicting ' decisions by two different three-judge panels, and to hold rearguments before the full court.
Features
Active Inducement In the Post-Grokster World
This article discusses the theory of active inducement in copyright law, the evolution of P2P technology over the past decade, recent U.S. and foreign legal decisions, and developments impacting copyright holders, file-sharing networks and Internet service providers.
Law Firms Slow To Awaken to Cybersecurity Threats
Law firms have been targeted by a sophisticated network of overseas hackers looking to infiltrate computer systems in order to gather data or monitor attorney activity, according to attorneys and technology experts. Law firms have dealt quietly with cyberattacks for years, but lately those strikes appear to be on the rise.
Social Networking Sites Present Challenges for Copyright Protection
Many social networking site users are likely to be unaware of the potential copyright issues associated with posting such original works. Once the work is on the Internet, it must be assumed that it will be available to all parties, both intended and unintended. What legal remedies are available if somebody copies a photograph or video and uses it for his or her own purposes without the owner's consent?
Features
Verdicts
Recent rulings of importance to you and your practice.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Enhanced Oversight of Search Warrants and Title III WiretapsSearch warrants and wiretaps were once used primarily to investigate organized crime, drug dealing and terrorism. In recent years, however, prosecutors have employed these tools increasingly in the context of white-collar crime to the point where it is now commonplace.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The Right to Associate in the DefenseThe "right to associate" permits the insurer to work with the insured to investigate, defend, or settle a claim. Such partnerships protect the insurer and can prove beneficial to the insured's underlying case and ultimate exposure.Read More ›
- DOJ's Cyber Fraud Initiative: A Wake-up Call That Keeps RingingDOJ's Cyber Fraud Initiative has been a wake-up call for companies to prioritize cybersecurity and adhere to stringent standards. By leveraging the FCA, DOJ has used a powerful enforcement tool to target a wide range of cybersecurity failures and misrepresentations. The increasing focus on cybersecurity by enforcement agencies means that robust cybersecurity practices are becoming a standard expectation, not just a best practice.Read More ›