Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Cisco Legal Increases Efficiency Image

Cisco Legal Increases Efficiency

Risa Schwartz

An ongoing challenge of Cisco Legal's priority to deliver value efficiently to its business customers is the need to facilitate intra- as well as inter-departmental collaboration with outside counsel and business partners and customers.

Features

Data Loss Prevention: A Concept in Motion Image

Data Loss Prevention: A Concept in Motion

Kandace Donovan

The current economic climate, along with portable devices and the mobility of today's workforce, has truly created the perfect storm ' exacerbating DLP issues and expanding the definition of DLP and related needs beyond the piecemeal technology offerings currently available. Preventative steps like ethical walls can easily be applied to stored data ' but data in use is the true risk to address.

e-Discovery of Structured Data Image

e-Discovery of Structured Data

Erik Post & Jim Vint

At the outset of an investigation, timelines and custodian-created information assets can all be garnered from extracts of accounting data, e-mails and documents through traditional discovery and disclosure. None of this tells you how, specifically, an event or series of events occurred. Were the alleged claims the result of system control errors, malicious employee action, fraud or simple misrepresentations by management as a means of covering up systemic losses by cooking the books to avoid audit concerns?

Upcoming Event Image

Upcoming Event

ALM Staff & Law Journal Newsletters

Entertainment Law in Review: 2008-2009. New York State Bar Association

May 2009 issue in PDF Format Image

May 2009 issue in PDF Format

ALM Staff & Law Journal Newsletters

…

Features

Twittering in Federal Court Image

Twittering in Federal Court

Lynne Marek

Some federal judges are opening the door to the press reporting directly from their courtrooms in the interest of bringing more transparency to the judicial process.

Features

Existing Internet Laws Reduce Constitutional Protections Image

Existing Internet Laws Reduce Constitutional Protections

Jonathan Bick

Internet communication necessitates sharing content and data with third parties. The voluntary transfer of such content and related data to third-party Internet communication facilitators reduces or eliminates First, Third, Fourth, Fifth and Fourteenth Amendment rights of Internet users. The technology and protocols used to enable Internet communication, as interpreted by existing privacy statutes and case law, further compromises Internet users' privacy and publicity rights. Both legal notices and technological techniques may be used to ameliorate this outcome.

Features

Trademark Protection in Cyberspace Rescued Image

Trademark Protection in Cyberspace Rescued

Norman C. Simon

A recent decision of the U.S. Court of Appeals for the Second Circuit, <i>Rescuecom Corp. v. Google Inc.</i>, has clarified precedent that had been assumed to foreclose Lanham Act challenges to the surreptitious use of trademarks to compete in cyberspace. In the wake of <i>Rescuecom</i>, that interpretation has been rejected, and advertisers have a potent weapon to protect their trademarks against unfair competition on the Web.

Features

Social Media Policies: Your Firm Needs One Image

Social Media Policies: Your Firm Needs One

Jay M. Jaffe

Being engaged in social networks has enormous value for your firm. Through them, you can establish thought leadership, find new recruits, provide a more efficient way for potential clients to find you online, and participate in and monitor discussions about the issues that impact your clients and your firm. The first thing you must do is create a social media policy ' or modify an existing policy that is free and available for you to borrow.

Case Briefs Image

Case Briefs

ALM Staff & Law Journal Newsletters

An analysis of recent key rulings.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›