Grant Money Doesn't Come Free
Here is a list of some things that in-house counsel may find surprising about the terms and conditions of the grant that a business might hope to receive under the Recovery Act. This list is especially critical for grant neophytes, particularly for-profit companies making their first foray into the grants world.
Grant Money Doesn't Come Free
During the economic downturn, a wealth of economic opportunities may seem like easy money. However, it is important that experienced and new grantees understand that these grants are a far cry from free money. Below is a rundown of some things that counsel may find surprising about the terms and conditions of the grant that a business might hope to receive under the Recovery Act.
Features
Enforcing and Attacking e-Commerce Patents
The validity of business method patents may be the lifeblood of an e-commerce enterprise. After all, nearly every successful Web site or Web-based service has at its core some intellectual property. Here we consider the enactment of the new local patent rules for the District of New Jersey, which became effective Jan. 1 and how they reflect on New Jersey as a suitable venue for patent suits.
Features
FTC Signals Tougher Standard For Online Tracking Disclosures
On June 4, the FTC announced a proposed consent agreement with Sears Holdings Management Corporation. The government makes note that the settlement is not final and does not include any finding of wrongdoing by SHMC, but that the working settlement sends a strong signal that the FTC will subject online tracking of consumer behavior to a stringent standard of disclosure.
The Cult of Personality
Anyone with even the most remote connection to e-commerce cannot have overlooked the recent explosion of social media as a form of marketing and business development. Of course, as with anything else online, problems have come with that popularity.
Are Web Applications a Security Concern?
Over the Fourth of July holiday weekend, a wave of cyber-assaults, or "denial of service" attacks, believed to have originated in North Korea, targeted a number of U.S. and South Korean government agencies and commercial Web sites, causing some to suffer temporary outages. While there were no reported leaks of classified information or serious damage to networks, the organized assault underscored the conclusions of a recent White House cybersecurity review; namely, that the country's digital infrastructure and domestic networks are not secure.
Features
Look, But Don't Log In
Unlike an employer's internal e-mail system, which is generally understood to be under the ownership and control of the employer, personal Web-based accounts accessed at work raise new and unsettled questions about an employee's expectations of privacy.
Changes Coming for Personal Data Gathered Online
Nevada was the first state to enact a law requiring entities that transfer customer personal information outside of the secure system of the business through an electronic transmission (other than a facsimile) to use encryption. In late 2008, Massachusetts was the second state to pass legislation that mandates the use of encryption. Michigan is considering similar legislation. This is an area to watch as other states could consider such legislation.
<i>Tiffany v. eBay</i> Appeal Grabs Second Circuit Spotlight
It isn't often that nearly every seat is full in the Second U.S. Circuit Court of Appeals' ample countroom. That it was on the morning of July 16 during oral arguments in the <i>Tiffany v. eBay</i> appeal indicates just how high the stakes are in this trademark infringement case ' not just for the parties directly involved, but for anyone with a vested interest on either side of the key issues being litigated.
Features
'The Way I Connected'
Officially launched on March 31, 2009, Martindale-Hubbell Connected a new global online community designed specifically for legal professionals. The network is quickly expanding as lawyers realize the advantages to connecting, networking, and collaborating with trusted and authenticated colleagues. The following article reflects two different lawyers, with equally different needs, who have benefited from utilizing Martindale-Hubbell Connected.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Enhanced Oversight of Search Warrants and Title III WiretapsSearch warrants and wiretaps were once used primarily to investigate organized crime, drug dealing and terrorism. In recent years, however, prosecutors have employed these tools increasingly in the context of white-collar crime to the point where it is now commonplace.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The Right to Associate in the DefenseThe "right to associate" permits the insurer to work with the insured to investigate, defend, or settle a claim. Such partnerships protect the insurer and can prove beneficial to the insured's underlying case and ultimate exposure.Read More ›
- DOJ's Cyber Fraud Initiative: A Wake-up Call That Keeps RingingDOJ's Cyber Fraud Initiative has been a wake-up call for companies to prioritize cybersecurity and adhere to stringent standards. By leveraging the FCA, DOJ has used a powerful enforcement tool to target a wide range of cybersecurity failures and misrepresentations. The increasing focus on cybersecurity by enforcement agencies means that robust cybersecurity practices are becoming a standard expectation, not just a best practice.Read More ›