Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

The Leasing Hotline Image

The Leasing Hotline

ALM Staff & Law Journal Newsletters

Highlights of the latest commercial leasing cases from around the country.

Developments of Note Image

Developments of Note

Michael Lear-Olimpi

Recent developments in e-commerce law and in the e-commerce industry.

e-Commerce Docket Sheet Image

e-Commerce Docket Sheet

Julian S. Millstein, Edward A. Pisacreta & Jeffrey D. Neuburger

Recent cases in e-commerce law and in the e-commerce industry.

Blog Defamation Image

Blog Defamation

Jonathan Bick

Bloggers can be held liable for defamatory statements posted on their sites, regardless of whether the statements were original comments generated by the blogger or whether he or she republished the statements that someone else made.<br>The good news, though, particularly for bloggers and counsel who advise and represent enterprises where blogs are likely to be created and used (say, for instance, e-commerce or technology companies that supply or deal extensively with e-businesses), is that just as with traditional print publications, bloggers may raise a defense against defamation claims under Internet communication-protection statutes and the First Amendment.

Empowering Attorneys and Clients to Exchange Large Files Securely Image

Empowering Attorneys and Clients to Exchange Large Files Securely

Daniel G. Rhodes

Given the sensitive nature of attorney/client files, the challenge is how to give attorneys the ability to exchange the information in a secure way. Strategically, security is the easier part of the problem; the bigger issue is how to facilitate the exchange so that users are in control of the process instead of having to call for IT support every time information must be exchanged.

January issue in PDF format Image

January issue in PDF format

ALM Staff & Law Journal Newsletters

&#133;

Features

Punk Rock and The Sale of Your e-Business Image

Punk Rock and The Sale of Your e-Business

Stanley P. Jaskiewicz

'Should I stay or should I go?'<br>That was the question that those classic '80s punk rockers The Clash asked in a song by the same title about a romance gone awry. That's just a song, though.<br>But, interestingly enough, that hard-driving ditty is applicable to the world of e-business: The entrepreneur contemplating the future of his or her business ' a love built of the same good times and bad, and with the same blood, sweat and tears as a real-life romance ' confronts the same dilemma when it's time to make that decision: Should he stay or should he go? How could a person not expect such perseveration? When an entrepreneur reads about the rapid rise of YouTube from startup to $1.65 billion buyout, he or she can easily forget about the many new firms that fail, and instead imagine being the personification of ' or fantasize about ' having a company that becomes the next tech-economy icon.

Features

Beware of Phishing: How Landlords and Tenants Can Avoid the Hook Image

Beware of Phishing: How Landlords and Tenants Can Avoid the Hook

Melissa J. Krasnow & Randolph M. Perkins

Although landlords and tenants often have different views on various topics, they share a common interest in protecting their premises against theft. Until recently, security considerations were generally limited to decisions concerning appropriate locks and the installation of stout hardware. In the new millennium, however, securing electronic entryways to premises may be of even greater importance, and it behooves landlords and tenants alike to keep abreast of developments in computer-related security breaches. In particular, landlords and tenants must be alert to a variety of identity theft threats, including phishing scams, in which they receive an e-mail from a seemingly reputable company (eg, a tenant receives an e-mail that appears to be from the landlord) that attempts to obtain personal information from the recipient when in fact the e-mail was sent by an identity thief.

Beyond the Signature Block: Analyze the Exhibits Attached to a Lease Image

Beyond the Signature Block: Analyze the Exhibits Attached to a Lease

Paul Robeznieks

In reviewing a draft of another party's form commercial retail lease, much time and effort is expended in analyzing the lease relative to the agreed-upon letter of intent and/or applying a client's leasing parameters into the lease. Many times the signature block is viewed as the proverbial 'goal line,' so if you can make it to the signature block, you are at the conclusion of your review; however, to review the form lease adequately and completely, one must continue the review and analyze all the exhibits attached to the form lease.

Offshore Outsourcing: Protecting Privacy A World Away Image

Offshore Outsourcing: Protecting Privacy A World Away

Luis Salazar

Business process outsourcing (BPO) to offshore service providers has become an integral part of the global economy ' and integrally 'e' ' finding particular success in the financial services, health care and IT industries.<br>Studies confirm that offshore BPO will not only continue to grow, but accelerate in the years to come. One study projects that by 2010, the world's 100 largest financial institutions will move $400 billion of their cost base offshore, saving an average of just under $1.5 billion annually each. <br>This explosive trend will continue to create economic, political, cultural and legal challenges for all types of companies dealing with personal data and the regulations that cover the collection, movement, storage and accessing of it ' in the United States and abroad. And, given the popularity of financial services and health care BPO, privacy concerns are certain to figure largely in these challenges. This article provides an overview of some of the legal and practical implications of BPO to offshore vendors.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • "Holy Fair Use, Batman": Copyright, Fair Use and the Dark Knight
    The copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›