Features
The Availability of Self-Help Evictions to Commercial Landlords
A landlord may re-enter leased commercial premises peaceably, without resorting to court process, in those states where it is permitted, if the right to do so is expressly reserved in a commercial lease, either a) upon the tenant's defaulting on the payment of rent or other lease terms, or b) upon termination of the lease or the tenant's abandoning the premises.
In the Spotlight: Final Rule for 'All Appropriate Inquiry' in Environmental Assessments
The U.S. Environmental Protection Agency ("EPA") has issued its final rule defining "all appropriate inquiry" for environmental due diligence necessary to qualify for the defenses to liability contained in the Comprehensive Environmental Response, Compensation and Liability Act of 1980 ("CERCLA" or "Super-fund"). This new rule, published in the Federal Register on Nov. 1, 2005, will apply to all property acquisitions that close on or after Nov. 1, 2006. Although the final rule dropped some of the harsher provisions of EPA's proposed standard, the new rule differs from the industry standard ASTM Standard E 1527-00 in several significant respects, which may have a significant effect upon the cost and scope of environmental site assessments conducted as part of property acquisitions. Prospective purchasers failing to follow the requirements of the final rule will not qualify for the "innocent purchaser," "adjacent landowner" or "bona fide prospective purchaser" defenses to liability under CERCLA in any post-closing litigation.
Features
Kelo v. City of New London: Takings, 'Public Use,' Urban Waterfront Redevelopment, and the Likely Survival of the Republic
In June, the Supreme Court affirmed the power of municipal redevelopment agencies to take property by eminent domain in order to assemble large parcels for economic development. <i>Kelo v. City of New London</i>, No. 04-108 (U.S. June 23, 2005) held that a municipality may take private homes in good condition to transfer them to a private developer as a part of an integrated plan to redevelop an area of New London. This use of eminent domain did not violate the "public use" requirement of the Takings Clause of the Fifth Amendment that, at its core, prohibits the government from taking private property solely to transfer it to another private person to serve a private interest. Kelo follows the Court's decision in <i>Lingle v. Chevron U.S.A. Inc.</i>, 125 S. Ct. 2074 (2005), where the Court ruled that a state statute that was not reasonably calculated to achieve its stated goal was not, by virtue of that irrationality, an unconstitutional taking. (In that case, the statute imposed a cap on the rent that oil companies could charge service station owners in Hawaii in order to achieve the stated goal of lower gasoline prices.)
Features
Nonphysical Differences Are Enough to Create Material Differences with Gray Market Goods
Under U.S. law, the resale of imported genuine goods bearing a valid U.S. trademark generally does not constitute trademark infringement. This is in part because, under the first sale doctrine, the trademark protections under U.S. law can be exhausted after the trademark owner's first authorized sale anywhere of the product bearing the trademark. Thus, U.S. law does not generally preclude the sale of identical genuine goods bearing a legitimate trademark even if the sale in the United States is unauthorized by the trademark owner.
Features
IP News
Highlights of the latest intellectual property news from around the country.
Features
If You're Confused, You Should Be: Two Federal Laws Apply to Cell Phone Messages
When it comes to sending promotional messages to wireless devices, such as through e-mail or short message service ("SMS"), there is more than one reason to be confused. First, there are two different federal laws that apply to messages that end up on wireless devices such as cell phones. The Controlling the Assault of Non-Solicited Pornography and Market Act (the "CAN-SPAM Act"), 15 U.S.C. §7701 <i>et seq.</i> and 18 U.S.C. §1037, applies if the address that is used to send the message consists of a username and a domain name. (Commonly, if the wireless device is a cell phone, the username would be the number of the cell phone and the domain name would be the domain name of the wireless carrier. If the wireless device is of some other type, the address may be formulated differently.) The applicable rule is: If the address has a domain name in it, the CAN-SPAM Act's wireless e-mail regulations apply.
Features
Infringement By Source Code 'Golden Master': Developments in Patent Infringement Law Concerning Extra-U.S. Sales
Until recently, U.S. software companies comfortably operated under the assumption that selling software that was copied from a "golden master" CD outside of the United States, and which was sold only to customers outside of the United States, did not infringe U.S. patents. Recent developments in the law have destroyed that comfort and made clear that infringement liability may very well lie for exactly those types of foreign sales.
Features
Editor's Note
Every year is filled with new opportunity and as Henry Ford said: "If you think you can do a thing or think you can't do a thing, you are right." So, take a step back as a management team and look at what's happening in the legal market.
Features
Index
A complete listing of cases covered in this issue.
Features
Cooperatives & Condominiums
Discussion of recent cases.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- Risks of “Baseball Arbitration” in Resolving Real Estate Disputes“Baseball arbitration” refers to the process used in Major League Baseball in which if an eligible player's representative and the club ownership cannot reach a compensation agreement through negotiation, each party enters a final submission and during a formal hearing each side — player and management — presents its case and then the designated panel of arbitrators chooses one of the salary bids with no other result being allowed. This method has become increasingly popular even beyond the sport of baseball.Read More ›
- Private Equity Valuation: A Significant DecisionInsiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity LitigationWhile the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.Read More ›