Features
Developments of Note
Key developments in the e-commerce industry.
Features
Digital Dictation Is Simplifying How Lawyers Work
With the advent of e-discovery, it's impossible to combine today's state of the art e-discovery solutions with yesterday's analog-dictation technology. Having a foot in both worlds is at best inefficient, and at worst can lead to misplaced data or work. <br>But the dawn of digital dictation has eliminated lawyers' worst frustrations of dictating to tape cassettes. With this new technology, lawyers can treat spoken words like any other digital data, inputting it to a desktop or other computer via a microphone and manipulating it in a digital voice-software file. Lawyers can then move spoken text around, and insert spoken or printed text as well as charts, spreadsheets, photographs and videos and, when they're done, transmit their work to a typist or save it to an audio file for clear and accurate translation into a printed document, or an e-document to be shared digitally or projected for viewing in the appropriate settings.
Utah and Michigan 'Do-Not E-Mail' Programs Take Effect
It is of concern to and important for e-commerce ventures to note that two states ' Michigan and Utah ' now prohibit the sending of certain kinds of e-mail messages to destinations listed on state-maintained registries. The new laws are directly at variance with the policy of the federal government, which so far has declined to adopt a do-not e-mail list. <br>But unless, and until, the Michigan and Utah registries are declared to be pre-empted by federal law, affected businesses should obtain and comply with those states' registries.
Two Rulings Toss Internet Stings
Two courts in the last 8 weeks have overturned the convictions of people accused of using the Internet to solicit sex from minors because the victims were actually law enforcement agents ' not true minors.
e-Commerce Docket Sheet
Recent cases in e-commerce law and in the e-commerce industry
Control Of The Internet
If the Internet is nongovernmental, then it may generate terms-of-use agreements to prohibit political speech. But if the Internet is governmentally controlled, then Internet users have a First Amendment right to use the Internet for public speech. <br>The give-and-take of who has the ability and vested authority to control constitutional matters is one in frequent debate, but the principle commonly known as the state action doctrine clearly sets forth the concept that only government actors are subject to certain constitutional limitations. Most important, the state action doctrine is a preliminary test for determining which cases are worthy to proceed on their merits with respect to whether constitutional rules apply.
Features
Australian Court Finds For Music Company
Justice Murray Rutledge Wilcox of the Federal Court held that certain defendants associated with Sharman Networks were liable for "authorization" of copyright infringement as a result of having distributed the Kazaa file-sharing software. <br>Notwithstanding substantial differences between the legal systems and copyright jurisprudence in Australia and the United States, <i>Grokster</i> and <i>Sharman</i> demonstrate remarkable similarities in analysis.
Features
In the Marketplace
Highlights of the latest equipment leasing news from around the country.
Features
Are Your Lease Payments Still Deductible? The Confounding IRS Guidance Limiting the 'Entertainment' Use of Business Aircraft
In its zeal to eradicate perceived abuses and further clip the wings of executives who, based on press reports, took great pleasure in using the company's airplane for personal purposes, Congress amended section 274(e)(2) of the Internal Revenue Code (the "Code") in the American Jobs Creation Act of 2004 ("AJCA"). Effective on the date of enactment (Oct. 22, 2004), these amendments effectively reversed the decisions of the Tax Court and Eighth Circuit in <i>Sutherland Lumber-Southwest, Inc. v. Commissioner</i>, 114 T.C. 197 (2000), <i>aff'd</i> 255 F.3d 495 (8th Cir. 2001), <i>acq.</i> AOD 2002-02 (Feb. 11, 2002), and prompted the Internal Revenue Service ("IRS" or the "Service") to issue guidance containing a myriad of rule changes and hinting at others, leaving tax practitioners scratching their heads and companies running for cover.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Enhanced Oversight of Search Warrants and Title III WiretapsSearch warrants and wiretaps were once used primarily to investigate organized crime, drug dealing and terrorism. In recent years, however, prosecutors have employed these tools increasingly in the context of white-collar crime to the point where it is now commonplace.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The Right to Associate in the DefenseThe "right to associate" permits the insurer to work with the insured to investigate, defend, or settle a claim. Such partnerships protect the insurer and can prove beneficial to the insured's underlying case and ultimate exposure.Read More ›
- DOJ's Cyber Fraud Initiative: A Wake-up Call That Keeps RingingDOJ's Cyber Fraud Initiative has been a wake-up call for companies to prioritize cybersecurity and adhere to stringent standards. By leveraging the FCA, DOJ has used a powerful enforcement tool to target a wide range of cybersecurity failures and misrepresentations. The increasing focus on cybersecurity by enforcement agencies means that robust cybersecurity practices are becoming a standard expectation, not just a best practice.Read More ›