Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Grant Money Doesn't Come Free Image

Grant Money Doesn't Come Free

Edward T. Waters

Here is a list of some things that in-house counsel may find surprising about the terms and conditions of the grant that a business might hope to receive under the Recovery Act. This list is especially critical for grant neophytes, particularly for-profit companies making their first foray into the grants world.

Grant Money Doesn't Come Free Image

Grant Money Doesn't Come Free

Edward T. Waters

During the economic downturn, a wealth of economic opportunities may seem like easy money. However, it is important that experienced and new grantees understand that these grants are a far cry from free money. Below is a rundown of some things that counsel may find surprising about the terms and conditions of the grant that a business might hope to receive under the Recovery Act.

Features

Enforcing and Attacking e-Commerce Patents Image

Enforcing and Attacking e-Commerce Patents

Stephen P. Pazan

The validity of business method patents may be the lifeblood of an e-commerce enterprise. After all, nearly every successful Web site or Web-based service has at its core some intellectual property. Here we consider the enactment of the new local patent rules for the District of New Jersey, which became effective Jan. 1 and how they reflect on New Jersey as a suitable venue for patent suits.

Features

FTC Signals Tougher Standard For Online Tracking Disclosures Image

FTC Signals Tougher Standard For Online Tracking Disclosures

Charles Kennedy

On June 4, the FTC announced a proposed consent agreement with Sears Holdings Management Corporation. The government makes note that the settlement is not final and does not include any finding of wrongdoing by SHMC, but that the working settlement sends a strong signal that the FTC will subject online tracking of consumer behavior to a stringent standard of disclosure.

The Cult of Personality Image

The Cult of Personality

Stanley P. Jaskiewicz

Anyone with even the most remote connection to e-commerce cannot have overlooked the recent explosion of social media as a form of marketing and business development. Of course, as with anything else online, problems have come with that popularity.

Are Web Applications a Security Concern? Image

Are Web Applications a Security Concern?

Richard Raysman & Peter Brown

Over the Fourth of July holiday weekend, a wave of cyber-assaults, or "denial of service" attacks, believed to have originated in North Korea, targeted a number of U.S. and South Korean government agencies and commercial Web sites, causing some to suffer temporary outages. While there were no reported leaks of classified information or serious damage to networks, the organized assault underscored the conclusions of a recent White House cybersecurity review; namely, that the country's digital infrastructure and domestic networks are not secure.

Features

Look, But Don't Log In Image

Look, But Don't Log In

Marjorie J. Peerce & Daniel V. Shapiro

Unlike an employer's internal e-mail system, which is generally understood to be under the ownership and control of the employer, personal Web-based accounts accessed at work raise new and unsettled questions about an employee's expectations of privacy.

Changes Coming for Personal Data Gathered Online Image

Changes Coming for Personal Data Gathered Online

Melissa J. Krasnow

Nevada was the first state to enact a law requiring entities that transfer customer personal information outside of the secure system of the business through an electronic transmission (other than a facsimile) to use encryption. In late 2008, Massachusetts was the second state to pass legislation that mandates the use of encryption. Michigan is considering similar legislation. This is an area to watch as other states could consider such legislation.

<i>Tiffany v. eBay</i> Appeal Grabs Second Circuit Spotlight Image

<i>Tiffany v. eBay</i> Appeal Grabs Second Circuit Spotlight

Ed Shanahan

It isn't often that nearly every seat is full in the Second U.S. Circuit Court of Appeals' ample countroom. That it was on the morning of July 16 during oral arguments in the <i>Tiffany v. eBay</i> appeal indicates just how high the stakes are in this trademark infringement case ' not just for the parties directly involved, but for anyone with a vested interest on either side of the key issues being litigated.

Features

'The Way I Connected' Image

'The Way I Connected'

Meredith B. Stone & Evan Brown

Officially launched on March 31, 2009, Martindale-Hubbell Connected a new global online community designed specifically for legal professionals. The network is quickly expanding as lawyers realize the advantages to connecting, networking, and collaborating with trusted and authenticated colleagues. The following article reflects two different lawyers, with equally different needs, who have benefited from utilizing Martindale-Hubbell Connected.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Bankruptcy Sales: Finding a Diamond In the Rough
    There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
    Read More ›
  • The Right to Associate in the Defense
    The "right to associate" permits the insurer to work with the insured to investigate, defend, or settle a claim. Such partnerships protect the insurer and can prove beneficial to the insured's underlying case and ultimate exposure.
    Read More ›
  • DOJ's Cyber Fraud Initiative: A Wake-up Call That Keeps Ringing
    DOJ's Cyber Fraud Initiative has been a wake-up call for companies to prioritize cybersecurity and adhere to stringent standards. By leveraging the FCA, DOJ has used a powerful enforcement tool to target a wide range of cybersecurity failures and misrepresentations. The increasing focus on cybersecurity by enforcement agencies means that robust cybersecurity practices are becoming a standard expectation, not just a best practice.
    Read More ›