Features
Using Computer Forensics to Investigate Employee Data Theft
Departing employees have a sense of ownership over the data that they copy. Intellectual property commonly stolen includes customer lists, secret formulas, source code, strategy documents and other trade secrets. The information is often used against the organization when the former employee goes to work for a competitor or decides to start a new company.
Features
A Look at Right of Publicity Suit Over <i>Gears of War</i>
Celebrities who are fiercely protective of their image and branding fight back, bringing an increasing number of lawsuits when it appears that a video game creator has borrowed without permission. These right of publicity cases highlight the tension that exists between the rights of public figures to control the way their image and likeness is used in commercial contexts and the First Amendment.
Features
The Challenge of Complying with China's New Cybersecurity Law
In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. The law is set to go into effect June 1, 2017. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.
Features
The Challenge of Complying with China's New Cybersecurity Law
In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. The law is set to go into effect June 1, 2017. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.
Features
Sixth Circuit Trims Bank's Good-Faith Defense to Fraudulent Transfer Claims
<b><I>Part One of a Two-Part Article</I></b><p>The issue of what constitutes a good-faith defense to a fraudulent transfer claim is a murky question that has produced a wide variety of reported decisions from appellate courts over the years. But a recent Sixth Circuit opinion sheds some clear light on a complicated fact pattern.
Features
<b><i>Daubert</i></b> Motions Really Do Work
<b><I>Part Two of a Three-Part Article</I></b><p>The starting point for any successful challenge under Federal Rules of Evidence (FRE) 702 and <I>Daubert</I> is the form and content of the witness's disclosure under Federal Rules of Civil Procedure (FRCP) 26(a)(2). Here is all you have to know.
Features
Beware: Inspecting Goods May Waive Implied Warranty Protections
When purchasing goods though an invoice, contract or otherwise, it is important to understand that a mere inspection of goods prior to purchase could waive implied warranty protections. A seller may effectively modify, or entirely exclude, implied warranties under the Uniform Commercial Code (UCC) by requiring a buyer to inspect, test or examine goods prior to purchase.
Features
Looking to Expand Into Mass Torts?
Mass torts are a strong way for trial lawyers to check Big Pharma's unfettered safety violations. However, it is not a practice area without dangers; and like so many other dangers, they are often hidden.
Features
When Actions Speak Louder Than Words
<b><I>Written Agreements Are Not the Final Word</I></b><p>Recently, an Ohio appellate court held that the parties' actual conduct — and not the express written provisions in their lease to the contrary — controlled in interpreting the intentions of the parties in contracting. This case serves as a good reminder for legal practitioners that our written agreements are often not the final word.
Features
Can Instagram Post of Photo Become Transformative?
An enlarged print of an Instagram post containing a copyrighted photo counts as a transformative use, an attorney for "appropriation artist" Richard Prince — whose use of other artists' material in his own works has made him no stranger to the courts — argued before a New York federal judge in April.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The Business of Legal Spend: How Finance Professionals Can Drive Smarter Outside Counsel ManagementLegal spend has become a core business issue that now shapes financial planning, operational decision making and risk management. What once lived primarily in the legal department has become a shared responsibility across client legal, finance, and operations teams and their outside counsel.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- New Networking Resolution In 2026: Build Connection Without the StressFor lawyers, networking is still one of the most dependable and effective ways to generate new business and build a steady pipeline of referrals. The encouraging news is that networking confidence is a skill that improves with preparation, awareness and practice. Below are strategies to help you feel more relaxed, prepared, and authentic at networking functions in 2026.Read More ›
