Evidence on Social Networking Sites
Social networking sites offer an abundance of exculpatory and impeaching evidence that may not be obtainable without some undercover detective work. Unfortunately, discovery rules and ethical guidelines have not kept pace with the digital sprawl of MySpace and Facebook. In the absence of explicit direction from the Rules of Professional Conduct and the laws governing online behavior, flying a false flag in these uncharted waters may be hazardous.
Tweet Tweet: The Rockin' Copyright Debate
Is a Tweet on the Twitter networking site protected by copyright law? The question is complex and without a definitive answer. The prevailing opinion is no, but with some possible exceptions.
Features
Best Practices for Transitioning to Word 2007
In the arena of technology, it is hard to forget those traumatic events when the whole world seemed to change on a dime. Nowhere is this felt as extremely as in the legal industry where document production requirements are time critical. How do you help your staff transition to Word 2007 so that they may reach the same productivity levels as before? This article provides some tips to lessen the anxiety and drama potentially associated with this migration.
<i><b>Case Study:</i></b> Thoughts of a Windows 7 Early Adopter
Deciding to become an early adopter for Microsoft Corp.'s new Windows 7 operating system was one of those moments when all of the stars aligned.
How to Manage Excel Lists
Excel is a good tool for managing lists at the end-user desk. Short of working with a full-fledged database, Excel provides the ability to sort, filter, subtotal, parse, join (concatenate) and change the letter casing of your information for easier data handling and reporting.
Features
'Voodoo Information': Authenticating Web Pages In Federal Court
During the life of any case, there will likely be valuable information obtained from the Internet that will be used at deposition or trial. Commonly, the proponent of online evidence will present a screen shot of the Web page, which was either downloaded as a .pdf or printed directly from the Web site. The process is like taking a photograph of the image as it appears on the monitor. In general, this captures not only the look, but also the download date and the URL. If proper steps are not taken to admit the evidence, the value of this information may be lost.
Features
IP News
Highlights of the latest intellectual property news from around the country.
Features
PTO's Annual Report Reveals Declining Revenue and Application Numbers, Plus Dip In Backlog
The U.S. Patent and Trademark Office's fiscal year 2009 annual report indicates declining revenue and patent filings. Notably, there was both a dip in the backlog of patent applications and an increase in the time it takes for the agency to issue a patent. Some lawyers believe the former can be attributed in part to applicants abandoning applications because of the economic downturn.
Features
IP Expenses
In-house lawyers can do great good for their companies by deploying IP assets to realize direct monetary return for their companies, but they are under more pressure to reduce expenses because of the inaccurate perception that IP-related expenses do not add to the bottom line, a perception that stems from accounting conventions.
Increased Delays Expected When Filing RCEs
The USPTO recently announced that it would implement internal changes to RCE docketing on Nov. 15, 2009, and will implement internal changes to the examiner count system by early 2010. These changes may significantly delay further examination of an application in which a RCE is filed, and consequently the ultimate issuance of a patent. To mitigate the effects of these changes, patent applicants may need to alter patent prosecution strategies going forward.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Disney-OpenAI’s Sora Deal: What it Signals for Licensing and Responsible AIThe Walt Disney Co.’s newly announced, three-year licensing agreement with OpenAI to bring more than 200 characters from Disney, Marvel, Pixar and Star Wars to Sora marks a pivotal moment at the intersection of intellectual property and generative AI. For rights holders, platforms, and brands, the deal illustrates an emerging blueprint for commercializing iconic IP in AI-native formats while attempting to manage legal, regulatory, and reputational risk.Read More ›
