Internet Child Porn Search Is 'Knowing Possession' in PA
Searching for child pornography on the Internet and following links to make such images appear on a computer screen constitutes knowing possession or control of that material, the Pennsylvania Supreme Court has ruled.
Features
Ninth Circuit Finds No First Amendment Violation in Teacher's Demotion over Blog Comments
Delivering a blow to bloggers' rights, a federal appeals court has ruled that a Washington state teacher's blog attacking co-workers, the union and the school district was not protected speech, and therefore she was not unlawfully demoted over it.
Virtual Contacts and Personal Jurisdiction
This article analyzes how courts are handling jurisdictional questions attendant to the next generation of technology, such as forms of "cloud computing," including virtual data rooms and social networks. As these technologies continue to develop and opportunities arise to increase revenue, companies risk having to defend themselves in far-off jurisdictions never before contemplated.
Features
Rocket Matter: Case Management for the Small Firm
What attorneys are missing is a brand new class of case management programs which, while they seek to replace older programs, also seek to solve many of the concerns law firms face when dealing with digital client data: security, mobile access and backup. As one of the newcomers to this market, Rocket Matter has embraced the new Software as a Service ("SaaS") model of delivering software from the Internet Cloud.
Features
KM Implementation At Reed Smith
Despite the fact that our total data creation had increased exponentially, Reed Smith hadn't invested nearly enough in our information infrastructure, and simple processes such as document retrieval were taking far too long. We knew we needed to take control of our data before it took hold of us. Following is an account of the firm's recent implementation of Recommind's MindServer Search platform as the foundation for its Knowledge Management infrastructure.
Features
New Document Metadata Changes In Microsoft Office 2007
The document metadata contained in a Word document other than the intended text doesn't necessarily create risk of adverse disclosure, because some document metadata is necessary for formatting or macro automation of the document. However, some document metadata, such as Tracked Changes, may be used to share among cooperators, but should not be shared with adversaries or in some instances clients, because it contains author and date metadata.
Features
Addressing Generational 'Tech Gaps' for More Efficient, Effective Legal Practice
One way legal practices are trying to handle cutbacks is through increased use of technology ' essentially harnessing software and online technology to make employees and operations more efficient while maintaining quality work. Working with IT colleagues, this has proven to be a successful strategy for many lawyers. However, it turns out there are some rather sharp differences in how technology is perceived and used by legal professionals among different generations. These differences, or "generational gaps," can lead to issues in the workplace between colleagues, as well as less efficient use of time and resources by law firm or company employees. Naturally, each of these concerns is amplified given difficult economic circumstances.
e-Commerce Notes
FTC Issues over $12 Million In Redress Checks to Victims of '90 Credit Fraud<br>FTC Tells the House About ID-Theft Efforts<br>FTC Mission Statutes Involving Online Commerce<br>Firm Web Site Receives ABA Branding Accolade<br>Discovery Organization Launches Job Project
CAN-SPAM Pre-empts California Spam Law
A Los Angeles judge, ruling on a case of first impression, recently found that the federal CAN-SPAM Act pre-empts a California law designed to curb false and misleading commercial e-mails.
A Touch of Gray
No one enjoys clearing rights. Checking that you may use content (whether on your Web site, in a publication, or for a performance) and won't be sued over it takes time and effort. And, for e-commerce counsel clients, that means more money.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- "Holy Fair Use, Batman": Copyright, Fair Use and the Dark KnightThe copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›