e-Commerce and Canada
With a recession taking a chunk from some e-retailers' sales, U.S. entrepreneurs are looking to expand their e-sales base north of the border, onto Canadian consumers' computer screens. But reaching that wider shopper base can present problems, particularly when a Web retailer attempts cross-border transactions into Canada. Many retailers may be surprised to learn that a number of legal differences exist that can present thorny issues to even the smallest boutique U.S.-based Web site selling to customers who make their purchases online in Canada.
Features
Sonnenschein Improves Financial Analysis and Decision-Making
Having outgrown the labor-intensive ways of creating budgets and monitoring the firm's performance, we decided in early 2008 to update the financial planning and analysis processes with new technology solutions.
Features
Cisco Legal Increases Efficiency
An ongoing challenge of Cisco Legal's priority to deliver value efficiently to its business customers is the need to facilitate intra- as well as inter-departmental collaboration with outside counsel and business partners and customers.
Features
Data Loss Prevention: A Concept in Motion
The current economic climate, along with portable devices and the mobility of today's workforce, has truly created the perfect storm ' exacerbating DLP issues and expanding the definition of DLP and related needs beyond the piecemeal technology offerings currently available. Preventative steps like ethical walls can easily be applied to stored data ' but data in use is the true risk to address.
e-Discovery of Structured Data
At the outset of an investigation, timelines and custodian-created information assets can all be garnered from extracts of accounting data, e-mails and documents through traditional discovery and disclosure. None of this tells you how, specifically, an event or series of events occurred. Were the alleged claims the result of system control errors, malicious employee action, fraud or simple misrepresentations by management as a means of covering up systemic losses by cooking the books to avoid audit concerns?
Upcoming Event
Entertainment Law in Review: 2008-2009. New York State Bar Association
Features
Twittering in Federal Court
Some federal judges are opening the door to the press reporting directly from their courtrooms in the interest of bringing more transparency to the judicial process.
Features
Existing Internet Laws Reduce Constitutional Protections
Internet communication necessitates sharing content and data with third parties. The voluntary transfer of such content and related data to third-party Internet communication facilitators reduces or eliminates First, Third, Fourth, Fifth and Fourteenth Amendment rights of Internet users. The technology and protocols used to enable Internet communication, as interpreted by existing privacy statutes and case law, further compromises Internet users' privacy and publicity rights. Both legal notices and technological techniques may be used to ameliorate this outcome.
Features
Trademark Protection in Cyberspace Rescued
A recent decision of the U.S. Court of Appeals for the Second Circuit, <i>Rescuecom Corp. v. Google Inc.</i>, has clarified precedent that had been assumed to foreclose Lanham Act challenges to the surreptitious use of trademarks to compete in cyberspace. In the wake of <i>Rescuecom</i>, that interpretation has been rejected, and advertisers have a potent weapon to protect their trademarks against unfair competition on the Web.
Features
Social Media Policies: Your Firm Needs One
Being engaged in social networks has enormous value for your firm. Through them, you can establish thought leadership, find new recruits, provide a more efficient way for potential clients to find you online, and participate in and monitor discussions about the issues that impact your clients and your firm. The first thing you must do is create a social media policy ' or modify an existing policy that is free and available for you to borrow.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- Surveys in Patent Infringement Litigation: The Next FrontierMost experienced intellectual property attorneys understand the significant role surveys play in trademark infringement and other Lanham Act cases, but relatively few are likely to have considered the use of such research in patent infringement matters. That could soon change in light of the recent admission of a survey into evidence in <i>Applera Corporation, et al. v. MJ Research, Inc., et al.</i>, No. 3:98cv1201 (D. Conn. Aug. 26, 2005). The survey evidence, which showed that 96% of the defendant's customers used its products to perform a patented process, was admitted as evidence in support of a claim of inducement to infringe. The court admitted the survey into evidence over various objections by the defendant, who had argued that the inducement claim could not be proven without the survey.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
