Features
Cisco Legal Increases Efficiency
An ongoing challenge of Cisco Legal's priority to deliver value efficiently to its business customers is the need to facilitate intra- as well as inter-departmental collaboration with outside counsel and business partners and customers.
Features
Data Loss Prevention: A Concept in Motion
The current economic climate, along with portable devices and the mobility of today's workforce, has truly created the perfect storm ' exacerbating DLP issues and expanding the definition of DLP and related needs beyond the piecemeal technology offerings currently available. Preventative steps like ethical walls can easily be applied to stored data ' but data in use is the true risk to address.
e-Discovery of Structured Data
At the outset of an investigation, timelines and custodian-created information assets can all be garnered from extracts of accounting data, e-mails and documents through traditional discovery and disclosure. None of this tells you how, specifically, an event or series of events occurred. Were the alleged claims the result of system control errors, malicious employee action, fraud or simple misrepresentations by management as a means of covering up systemic losses by cooking the books to avoid audit concerns?
Upcoming Event
Entertainment Law in Review: 2008-2009. New York State Bar Association
Features
Twittering in Federal Court
Some federal judges are opening the door to the press reporting directly from their courtrooms in the interest of bringing more transparency to the judicial process.
Features
Existing Internet Laws Reduce Constitutional Protections
Internet communication necessitates sharing content and data with third parties. The voluntary transfer of such content and related data to third-party Internet communication facilitators reduces or eliminates First, Third, Fourth, Fifth and Fourteenth Amendment rights of Internet users. The technology and protocols used to enable Internet communication, as interpreted by existing privacy statutes and case law, further compromises Internet users' privacy and publicity rights. Both legal notices and technological techniques may be used to ameliorate this outcome.
Features
Trademark Protection in Cyberspace Rescued
A recent decision of the U.S. Court of Appeals for the Second Circuit, <i>Rescuecom Corp. v. Google Inc.</i>, has clarified precedent that had been assumed to foreclose Lanham Act challenges to the surreptitious use of trademarks to compete in cyberspace. In the wake of <i>Rescuecom</i>, that interpretation has been rejected, and advertisers have a potent weapon to protect their trademarks against unfair competition on the Web.
Features
Social Media Policies: Your Firm Needs One
Being engaged in social networks has enormous value for your firm. Through them, you can establish thought leadership, find new recruits, provide a more efficient way for potential clients to find you online, and participate in and monitor discussions about the issues that impact your clients and your firm. The first thing you must do is create a social media policy ' or modify an existing policy that is free and available for you to borrow.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Removing Restrictive Covenants In New YorkIn Rockwell v. Despart, the New York Supreme Court, Third Department, recently revisited a recurring question: When may a landowner seek judicial removal of a covenant restricting use of her land?Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›