Features
<i><b>Commentary:</b></i> Should the Music Stop for iTunes?
Debates over intellectual property rights often heat up around confrontations between those wanting more protection and those wanting less. But perhaps more attention should be paid to the detailed structure of legal rules governing these assets as they are actually used in real-world transactions.
Features
<i>Tiffany v. eBay</i>
The recent decision in <i>Tiffany v. eBay</i> represents a thorough and well-considered exploration of the basis for finding secondary liability in the electronic marketplace for those who facilitate the sale of infringing goods without even selling a product and, conversely, the way for the maker of the marketplace to avoid liability for infringements by those who sell on its site.
Third Circuit Strikes Down COPA ' Again
The Child Online Protection Act ('COPA') suffers from a slew of fatal flaws that render the law unconstitutional under the First Amendment, the Third U.S. Circuit Court of Appeals has ruled. The decision, handed down on July 22, comes after nearly a decade of litigation '' including two trips to the U.S. Supreme Court '' and marks the sixth time that a court has blocked the law from going into effect.
Features
Internet Auctions
Business is always a battlefield, but few e-commerce proponents have fought campaigns as fierce as those to keep Internet auctioning license-free. So intense have been skirmishes between online sellers and state legislators that only one state has a law specifically requiring online auctioneer licensing.
Features
Virtualization and Law Office Computer Systems
Virtualization has been getting a significant amount of coverage in the IT press. Open almost any IT trade publication in the last six months and there are numerous articles about virtualization. It brings to mind the movie 'Multiplicity,' or the scientists that are currently involved in 'cloning.' So what is the entire buzz about? And what does it mean to us, the legal community?
Features
<b><i>Software Review:</b></i> The Buzz on Buzzword
The livelihood of a lawyer involves a lot of words, which is why practically every lawyer uses a word processor. Traditionally, this means installing and using a software copy of Microsoft Word or Corel WordPerfect. Over the last few years, however, we've seen the emergence of a new delivery method for software.
Web 2.0 Comes to the Legal Profession
We now have what many technology experts call 'Web 2.0' and, once again, technology offers new opportunities for members of the legal profession to improve the efficiency and effectiveness of their workflow. We believe it is in the interest of technology leads within law firms and corporate counsel groups to consider how they can better incorporate these innovations into their practices, given the benefits they can deliver.
Features
Best Practices for Reducing Errors in e-Discovery
e-Discovery is inherently messy and prone to mistakes. The data itself is not always what it appears, the volumes of data are often mind-boggling, and the locations in which the data is stored are not always easy to find. Add to this the fact that we have recently witnessed a lawsuit involving a major law firm and an e-discovery provider, all which revolved around e-discovery mistakes. While the lawsuit was ultimately settled, an environment of mistrust has surfaced. This mistrust, however, can easily be eliminated with a little planning and foresight.
The Role of Tape
Information stored on various kinds of electronic media is becoming central to virtually all corporate investigations, whether they are litigation-, regulatory- or audit-driven. The adoption of e-mail as the standard communication and document distribution mechanism, coupled with its exponential growth, has focused attention on electronically stored information.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- The Anti-Assignment Override ProvisionsUCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?Read More ›