Features
What's in a Domain Name? The Changing Internet
Generic, top-level domain names (gTLDs), such as .com or .net, are the sorters of the Internet. They serve the single purpose of identifying the database in which a domain name is registered. Last June, ICANN reversed its long-held position and announced that it would allow an unlimited number of generic top-level domains.
Features
Online Anti-Porn Law Dies at Supreme Court
A federal law intended to restrict children's access to Internet pornography died quietly last month at the U.S. Supreme Court, more than 10 years after Congress overwhelmingly approved it. The Supreme Court rejected U.S. government prosecutors' last-ditch defense of COPA without comment, meaning that the law will not be enforced.
Features
RIAA Tempers Tactics
In December, the RIAA announced that it would no longer look to file suit against individual file sharers and instead form relationships with ISPs that maintain the online accounts of the consumers.
Document Management With Lextranet 5.6
There is no shortage of e-discovery case-management tools on the market. Each has its unique strengths and shortcomings. Most applications provide a plethora of features for managing document workflows, searching the database, reviewing and coding documents and so on. But having the most features doesn't necessarily translate into the strongest solution. User-friendliness, customization and reviewer throughput speed are much more important than having the most "bells and whistles" or a zillion different functions.
Features
Listen Up: What the Discoverability of Audio Recordings Should Mean to IT Professionals
The necessity for IT professionals to haul audio recordings into their general e-discovery process is gaining awareness because of situations that may ' at first glance ' appear harmless.
Features
Empower Your Browser: New Possibilities
The Web browser has evolved into a platform for our digital lives, offering more interactivity while moving further beyond its passive browsing roots (i.e., checking e-mail, paying bills and balancing checkbooks, watching videos, social networking, playing games, networking and even managing a law practice). That is precisely the core of Google's new Web browser called Chrome.
Features
The e-Discovery Balancing Act
Progressive corporations are starting to treat e-discovery as any other standard corporate business process: repeatable, defensible and measurable. This new dynamic raises an obvious question: What portions of the e-discovery process are best suited to be "in-sourced," and how do IT professionals within an enterprise work with their partners to ensure effective collaboration/communication?
Features
Case Notes
Recent litigation of interest to you and your practice.
Features
Product Liability Litigation
The different ' sometimes even higher ' product standards required by non-American countries can adversely affect product protection here in the United States, as plaintiff's attorneys can use these discrepancies to their advantage in litigation against product manufacturers.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- UCC ' 1-203: A Few Lesser (and Not Always Lessor) Known PitfallsThis article discussed the unexpected (and, for a lessor, sometimes unfortunate) consequences that can result by not understanding all the nuances of UCC ' 1-203.Read More ›
- Players On the MoveA look at moves among attorneys, law firms, companies and other players in entertainment law.Read More ›