Account

Sign in to access your account and subscription

Register

LJN Newsletters

  • An in-depth look at several important rulings.

    May 02, 2014ljnstaff | Law Journal Newsletters |
  • Federal Circuit Focuses on Burdens Of Proof in Travatan Z' Case
    History of Patent Litigation May Establish Justiciable Controversy
    Federal Circuit Holds a Reexamined Patent is 'Same Patent' as Original For Claim Preclusion

    May 02, 2014Howard J. Shire and Tyler Doh
  • The amount of a first-party insurance claim may be subject to varying valuation approaches, often depending upon whether the policyholder repairs or replaces the damaged property, and the range of valuation options will be established by the policy language,

    May 02, 2014Paul A. Rose and Elizabeth E. Collins
  • Rights in pre-Feb. 15, 1972, sound recordings ' which are protected by state law, rather than federal copyright law ' are hotly litigated in the digital music era. On April 17, for example, major record labels sued the music-streaming service Pandora in New York Supreme Court in Manhattan. The suit alleges common-law copyright infringement and unfair competition from Pandora's use of pre-1972 recordings.

    May 02, 2014Stan Soocher
  • Actor's Agreement Gave Merchandising Rights to Production Company
    E-Book of English Translation of Novel Isn't Derivate Work

    May 02, 2014Stan Soocher
  • If your company or client is the target of such a frivolous claim, there is a growing body of law that offers effective offensive strategies.

    May 02, 2014Ronald J. Levine, Leah Kelman
  • In-depth analysis of key rulings.

    May 02, 2014ALM Staff | Law Journal Newsletters |
  • The April issue of Entertainment Law & Finance reported on a ruling by the U.S. Court of Appeals for the Ninth Circuit involving the Internet video Innocence of Muslims. That article discussed the court's "secret" takedown order and the court's view on copyright ownership of acting roles in movies. The article that follows provides further analysis of the copyright ownership issue in the case.

    May 02, 2014Michael I. Rudell and Neil J. Rosini
  • The Computer Fraud and Abuse Act (CFAA) has come under recent scrutiny due to its use against unsuspecting individuals who may not be the malicious hackers that the Act was originally meant to address.

    May 02, 2014Eric A. Packel
  • Although the reach of the federal government is impressive, all 50 states have had for some time a powerful weapon in the form of the Uniform Act to Secure the Attendance of Witnesses from Without the State (Uniform Act). Originally enacted in New York in 1936, it is used today to facilitate the issuance of extraterritorial or "cyber subpoenas," with nationwide reach.

    May 02, 2014Peter A. Crusco