Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

In re Allied Chemical Corp.: 'Cause' for Celebration By Defendants? Image

In re Allied Chemical Corp.: 'Cause' for Celebration By Defendants?

By Kurt Hamrock & Geraldine Doetzer

The Texas Supreme Court has made it clear that it considers the disclosure of the identities of medical or other causation experts willing to link plaintiffs' injuries to defendants' products or behavior as 'basic information' without which defendants cannot mount an appropriate defense. At least in the case of mass tort claims, trial courts are barred from setting trial dates or otherwise moving cases forward without providing defendants with a real opportunity to obtain basic causation information from plaintiffs' counsel.

Features

e-Commerce Docket Sheet Image

e-Commerce Docket Sheet

ALM Staff & Law Journal Newsletters

Recent cases in e-commerce law and in the e-commerce industry.

Practice Tip: The Earning Capacity of Business Owners Image

Practice Tip: The Earning Capacity of Business Owners

Chad L. Staller

The owner of a business can claim as lost earning capacity in a personal-injury action only the working time lost due to injuries and harm to future earning capacity, not the business' alleged profits in perpetuity.

Germany: More on The Enforceability Of GPL Provisions Image

Germany: More on The Enforceability Of GPL Provisions

Dr. Katharina Scheja

Once again, a German court has ruled on the GNU (programs of all-free software) General Public License ('GPL') and confirmed its enforceability in Germany. The judgment was handed down on July 24 (Landgericht Mnchen I, decision of 24th July 2007 - 7 O 5245/07 - not final); still, it is noteworthy that the GPL provisions so far have received positive evaluation by German courts.

Features

Dealing with the Surprise Government Interview Image

Dealing with the Surprise Government Interview

David M. Rosenfield & James A. Moss

When conducting criminal investigations about possible corporate wrongdoing, in alleged defective-products matters and other cases, government agents often seek to interview company executives and other employees ' of old-line bricks-and-mortar and e-commerce companies ' 'by ambush' outside the office, to minimize the likelihood that a supervisor or a company lawyer might intervene to thwart the interview. There is nothing improper in using this investigative technique; nevertheless, employees should know their legal rights and understand the risks they take when they submit to such surprise interrogations.

Features

The China Syndrome: Will the U.S. Legal System Deal with Tainted Chinese Imports or Meltdown? Image

The China Syndrome: Will the U.S. Legal System Deal with Tainted Chinese Imports or Meltdown?

Daniel J. Herling

The 'classic' product liability lawsuit against the Chinese manufacturer raises many issues, including, but not limited to, jurisdiction, forum non conveniens, and the uncertainty as to whether traditional U.S. product liability or tort defenses apply. Probably the most important issue, enforcement of any judgment in China, is also either unchartered or risky territory for a claimant.

Features

e-Telephone Privacy Image

e-Telephone Privacy

Jonathan Bick

At low cost and widening availability, VoIP is common in business, and might be used at a greater volume and frequency among tech and e-commerce companies, thus making it a technology and a commodity to watch. Unfortunately, for consumer and businessperson alike, a concealed cost of VoIP service might be a user's privacy. That's because traditional telephone privacy is strictly sheltered by existing case law and statute, while VoIP, it could be argued, is unprotected in many instances.

Features

Bluecasting or Bluespamming? Image

Bluecasting or Bluespamming?

Luis Salazar

Bluetooth, the moniker of the popular wireless technology, is named after a 'Viking' king famous for having united several Scandinavian countries, at least temporarily. Bluetooth, however, was not a Viking in the popular sense ' he used cunning more often than violence to achieve his objectives. It is perhaps appropriate, then, and certainly no surprise that marketers ' e-commerce firms and their marketing reps and agents among them ' have begun using Bluetooth technologies to do some 'Viking' of their own. Bluetooth Marketing ' also called Bluespamming ' uses Bluetooth technology to reach nearby potential consumers and offer them coupons, downloads, and other product or service information.

Features

Selling Your e-Commerce Company For Private Equity Money Image

Selling Your e-Commerce Company For Private Equity Money

Stanley P. Jaskiewicz

Entrepreneurs have traditionally dreamed of creating family businesses that would last for generations. Certainly, everyone has seen the stickers and other marketing testifying to a firm's and its founding family's decades of service, and their stability and track record. But in today's constantly changing e-commerce world, a business often must reinvent itself several times in one generation, much less plan to last for several.

November issue in PDF format Image

November issue in PDF format

ALM Staff & Law Journal Newsletters

…

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›