Features
Backup Protection and Continuity Keep Firms Running
Firms of every size and in every geographic area must protect their electronic data and be prepared for potential IT disasters.
Sorting Out Vested Rights and Non-Conforming Uses
Pre-existing non-conforming use doctrine and "vested rights" doctrine are two different, but related, mechanisms. The Court of Appeals recently decided a case in which the landowner raised both doctrines.
Virtualization Technology in the Law Firm
Virtualization is one of <i>the</i> IT buzzwords in 2010. One of the greatest advantages that virtualization brings is the ability to minimize the complexity of the end-user computing environment for the firm's attorneys and support staff.
Features
Third Circuit Asked to Clarify Student Internet Speech Cases
Cutting-edge questions in the First Amendment arena have recently stemmed from clashes between students and school districts over the limits ' if any ' that may be imposed on speech posted on social networking sites like MySpace and Facebook. Now lawyers on both sides of the issue are urging the Third U.S. Circuit Court of Appeals to vacate two recent ' and seemingly conflicting ' decisions by two different three-judge panels, and to hold rearguments before the full court.
Features
Active Inducement In the Post-Grokster World
This article discusses the theory of active inducement in copyright law, the evolution of P2P technology over the past decade, recent U.S. and foreign legal decisions, and developments impacting copyright holders, file-sharing networks and Internet service providers.
Law Firms Slow To Awaken to Cybersecurity Threats
Law firms have been targeted by a sophisticated network of overseas hackers looking to infiltrate computer systems in order to gather data or monitor attorney activity, according to attorneys and technology experts. Law firms have dealt quietly with cyberattacks for years, but lately those strikes appear to be on the rise.
Social Networking Sites Present Challenges for Copyright Protection
Many social networking site users are likely to be unaware of the potential copyright issues associated with posting such original works. Once the work is on the Internet, it must be assumed that it will be available to all parties, both intended and unintended. What legal remedies are available if somebody copies a photograph or video and uses it for his or her own purposes without the owner's consent?
Features
Verdicts
Recent rulings of importance to you and your practice.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- COVID-19: Economic Stimulus and SBA LoansA summary of information on the various provisions under the new federal economic stimulus package.Read More ›
- Licensing Audits from Licensees' PerspectiveThe audit clause is a necessary means for the licensor to protect its interests and to guard against unscrupulous licensees. But it is a mistake to think that the clause is there solely to prevent malfeasance.Read More ›