Features
Bare Corporate Receipt Doctrine Less Help to Copyright Plaintiffs
The first line of defense in most copyright infringement actions revolves around the question of "access" ' namely, whether the defendant had a reasonable possibility of viewing or hearing the plaintiff's work such that the defendant could have copied it illegally. Absent some direct proof that the defendant actually copied the plaintiff's work ' evidence that typically is not present ' a plaintiff will attempt to prove such copying indirectly by establishing that a defendant had access to the plaintiff's work and that the defendant's work is "substantially similar" to the plaintiff's. The U.S. Court of Appeals for the Second Circuit has made it more difficult for plaintiffs to prove access. <BR>Specifically, in the Second Circuit's view, a company's "bare corporate receipt" of a plaintiff's work is insufficient proof of access.
Features
RIAA Sues More U.S. File-Sharers As Study Shows Infringement in Decline
Employing its 'John Doe' litigation strategy again, the Recording Industry Association of America (RIAA) has sued another group of anonymous infringers ' this time 477 people ' accused of illegally distributing copyrighted sound recordings on peer-to-peer file sharing services.
Features
First Amendment Must Yield to Child Pornography Law
Facing its first constitutional challenge to the Florida Computer Pornography and Child Exploitation Prevention Act of 1986, the Florida Court of Appeals recently scored a victory for child protection advocates and law enforcement
Features
EarthLink, Cox Pulled Into Music Piracy Suits
Music piracy cases in Georgia could determine whether recording companies must meet certain standards before forcing Internet service providers to hand over the names of subscribers suspected of downloading and circulating copyrighted, bootleg recordings.
Features
Viable e-Signature Options
While the Internet continues to replace traditional forms of commerce communication, the use of contracts to memorialize business agreements remains constant. In order to implement more fully the transition to Internet commerce communications, businesses are struggling to find an appropriate replacement for the traditional authentication procedures. In short, businesses seek lawful electronic signatures to replace traditional signatures. This query has resulted in six viable e-signature options.
Features
Using IP Dispute Procedures to Combat Net Fraud
Internet fraud is becoming one of the most common and lucrative forms of crime in today's information-based economy. As the Internet has grown, so too have incidences of its misuse. How can intellectual property rights help fight this growing menace?
Health Savings Accounts
Starting in 2004, law firms have another option in attempting to mitigate rising health insurance costs. Recently enacted Health Savings Accounts (HSAs) offer law firms and their employees a tax favored vehicle to pay for medical expenses.
Features
Planning The Successful Retreat
Whatever the goal of a law firm retreat, it will not succeed unless adequate time and effort have gone into the planning process. In fact, a major portion of the work involved must be done before the retreat is actually held. The retreat should not be viewed as a panacea, but as a practical management tool that can be wielded in a variety of ways.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Enhanced Oversight of Search Warrants and Title III WiretapsSearch warrants and wiretaps were once used primarily to investigate organized crime, drug dealing and terrorism. In recent years, however, prosecutors have employed these tools increasingly in the context of white-collar crime to the point where it is now commonplace.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The Right to Associate in the DefenseThe "right to associate" permits the insurer to work with the insured to investigate, defend, or settle a claim. Such partnerships protect the insurer and can prove beneficial to the insured's underlying case and ultimate exposure.Read More ›
- DOJ's Cyber Fraud Initiative: A Wake-up Call That Keeps RingingDOJ's Cyber Fraud Initiative has been a wake-up call for companies to prioritize cybersecurity and adhere to stringent standards. By leveraging the FCA, DOJ has used a powerful enforcement tool to target a wide range of cybersecurity failures and misrepresentations. The increasing focus on cybersecurity by enforcement agencies means that robust cybersecurity practices are becoming a standard expectation, not just a best practice.Read More ›