Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

2009 FMLA Regulations Image

2009 FMLA Regulations

Gregory R. Fidlon

The DOL issued its first major overhaul of the FMLA in November. These final regulations, which became effective Jan. 16, 2009, include provisions addressing military leave entitlements created in early 2008 by the National Defense Authorization Act ("NDAA"). The new regulations also update and clarify employer and employee rights and responsibilities under the FMLA. The following are the key changes and suggested steps employers should take to comply.

Features

Performing a Litigation Audit on Your Corporate Agreements Image

Performing a Litigation Audit on Your Corporate Agreements

Michael Eidel

In the event litigation occurs, previously ignored boilerplate provisions may well determine who maintains leverage throughout the case and, ultimately, who prevails. This article discusses the applicable general principles and drafting considerations for some of the most frequently litigated boilerplate provisions.

Features

Interview with Michael W. Robinson, Senior Vice President, Levick Strategic Communications Image

Interview with Michael W. Robinson, Senior Vice President, Levick Strategic Communications

Adam J. Schlagman

Michael Robinson, a senior vice president of a leading crisis communications firm, Levick Strategic Communications, discusses the new business and communications challenges posed by the economic downturn and the role of corporate counsel in preventing and managing crises.

Grant Money Doesn't Come Free Image

Grant Money Doesn't Come Free

Edward T. Waters

Here is a list of some things that in-house counsel may find surprising about the terms and conditions of the grant that a business might hope to receive under the Recovery Act. This list is especially critical for grant neophytes, particularly for-profit companies making their first foray into the grants world.

Grant Money Doesn't Come Free Image

Grant Money Doesn't Come Free

Edward T. Waters

During the economic downturn, a wealth of economic opportunities may seem like easy money. However, it is important that experienced and new grantees understand that these grants are a far cry from free money. Below is a rundown of some things that counsel may find surprising about the terms and conditions of the grant that a business might hope to receive under the Recovery Act.

Features

Enforcing and Attacking e-Commerce Patents Image

Enforcing and Attacking e-Commerce Patents

Stephen P. Pazan

The validity of business method patents may be the lifeblood of an e-commerce enterprise. After all, nearly every successful Web site or Web-based service has at its core some intellectual property. Here we consider the enactment of the new local patent rules for the District of New Jersey, which became effective Jan. 1 and how they reflect on New Jersey as a suitable venue for patent suits.

Features

FTC Signals Tougher Standard For Online Tracking Disclosures Image

FTC Signals Tougher Standard For Online Tracking Disclosures

Charles Kennedy

On June 4, the FTC announced a proposed consent agreement with Sears Holdings Management Corporation. The government makes note that the settlement is not final and does not include any finding of wrongdoing by SHMC, but that the working settlement sends a strong signal that the FTC will subject online tracking of consumer behavior to a stringent standard of disclosure.

The Cult of Personality Image

The Cult of Personality

Stanley P. Jaskiewicz

Anyone with even the most remote connection to e-commerce cannot have overlooked the recent explosion of social media as a form of marketing and business development. Of course, as with anything else online, problems have come with that popularity.

Are Web Applications a Security Concern? Image

Are Web Applications a Security Concern?

Richard Raysman & Peter Brown

Over the Fourth of July holiday weekend, a wave of cyber-assaults, or "denial of service" attacks, believed to have originated in North Korea, targeted a number of U.S. and South Korean government agencies and commercial Web sites, causing some to suffer temporary outages. While there were no reported leaks of classified information or serious damage to networks, the organized assault underscored the conclusions of a recent White House cybersecurity review; namely, that the country's digital infrastructure and domestic networks are not secure.

Features

Look, But Don't Log In Image

Look, But Don't Log In

Marjorie J. Peerce & Daniel V. Shapiro

Unlike an employer's internal e-mail system, which is generally understood to be under the ownership and control of the employer, personal Web-based accounts accessed at work raise new and unsettled questions about an employee's expectations of privacy.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • "Holy Fair Use, Batman": Copyright, Fair Use and the Dark Knight
    The copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›