Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Backup Protection and Continuity Keep Firms Running Image

Backup Protection and Continuity Keep Firms Running

Darryl d'Aquin

Firms of every size and in every geographic area must protect their electronic data and be prepared for potential IT disasters.

Sorting Out Vested Rights and Non-Conforming Uses Image

Sorting Out Vested Rights and Non-Conforming Uses

Stewart E. Sterk

Pre-existing non-conforming use doctrine and "vested rights" doctrine are two different, but related, mechanisms. The Court of Appeals recently decided a case in which the landowner raised both doctrines.

Virtualization Technology in the Law Firm Image

Virtualization Technology in the Law Firm

Stanleigh Rabin

Virtualization is one of <i>the</i> IT buzzwords in 2010. One of the greatest advantages that virtualization brings is the ability to minimize the complexity of the end-user computing environment for the firm's attorneys and support staff.

Index Image

Index

ALM Staff & Law Journal Newsletters

A comprehensive list of all cases covered in this issue.

Features

Third Circuit Asked to Clarify Student Internet Speech Cases Image

Third Circuit Asked to Clarify Student Internet Speech Cases

Shannon P. Duffy

Cutting-edge questions in the First Amendment arena have recently stemmed from clashes between students and school districts over the limits ' if any ' that may be imposed on speech posted on social networking sites like MySpace and Facebook. Now lawyers on both sides of the issue are urging the Third U.S. Circuit Court of Appeals to vacate two recent ' and seemingly conflicting ' decisions by two different three-judge panels, and to hold rearguments before the full court.

Features

Active Inducement In the Post-Grokster World Image

Active Inducement In the Post-Grokster World

Richard Raysman & Peter Brown

This article discusses the theory of active inducement in copyright law, the evolution of P2P technology over the past decade, recent U.S. and foreign legal decisions, and developments impacting copyright holders, file-sharing networks and Internet service providers.

Law Firms Slow To Awaken to Cybersecurity Threats Image

Law Firms Slow To Awaken to Cybersecurity Threats

Karen Sloan

Law firms have been targeted by a sophisticated network of overseas hackers looking to infiltrate computer systems in order to gather data or monitor attorney activity, according to attorneys and technology experts. Law firms have dealt quietly with cyberattacks for years, but lately those strikes appear to be on the rise.

Movers & Shakers Image

Movers & Shakers

ALM Staff & Law Journal Newsletters

Who's doing what; who's going where.

Social Networking Sites Present Challenges for Copyright Protection Image

Social Networking Sites Present Challenges for Copyright Protection

Ryan W. O'Donnell And Aneesh Mehta

Many social networking site users are likely to be unaware of the potential copyright issues associated with posting such original works. Once the work is on the Internet, it must be assumed that it will be available to all parties, both intended and unintended. What legal remedies are available if somebody copies a photograph or video and uses it for his or her own purposes without the owner's consent?

Features

Verdicts Image

Verdicts

ALM Staff & Law Journal Newsletters

Recent rulings of importance to you and your practice.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›