Supreme Court Overturns Burden-Shift in Non-Infringement Judgment
Federal Circuit Clarifies Rules for Patent Term Extension
Federal Circuit Confirms That All Members of a Priority Chain Must Recite Full Lineage
- February 28, 2014Howard J. Shire and Wyatt Delfino
President Barack Obama's administration on Feb. 12 released its much-anticipated voluntary cybersecurity framework, giving U.S. companies a common handbook on how they can try to fend off hackers.
February 28, 2014Andrew Ramonas and Steven SalkinFor nearly a decade ICANN has been working on a plan to expand the Internet. That process is underway right now, and the expansion will be taking place in just a few months as a slew of top level domains like .nyc, .apple, .citi, .green, .apple, .app, .llc, .club and hundreds more will be going live in the next few months.
February 28, 2014David K. MitnickGoogle the phrase "content marketing" and the CPU on your notebook or tablet will almost explode with search results. Content marketing is hot, especially if you're trying to market legal services.
February 28, 2014Jasmine C. Trillos-Decarie & Peter OzolinAs of Jan. 1, 2015, the ACA begins to impose certain health coverage requirements on employers who have at least 50 employees. Even though its implications are almost a year away, it is not too soon for employers to prepare for the Employer Mandate. Employers would be wise to figure out if the mandate applies to them, understand the potential penalties that can be imposed on them and, taking into account all of the various considerations, decide if they want to pay or play.
February 28, 2014Gregg Fisch and Michael CampbellBig data is ubiquitous these days, but still largely untapped in legal circles. Litigators can take a page out of a sports team's playbook and use the patterns and trends found in data to make more informed decisions about case staffing, spend management, case strategy and probable outcomes.
February 28, 2014Jim MichalowiczAereomay turn out to be one of the most important copyright decisions since enactment of the Copyright Act of 1976, with potential wide-ranging ramifications for the television industry and the fast-growing cloud computing industry.
February 28, 2014J. Alexander Lawrence, David S. BrownIn recent years, federal legislation has encouraged attorneys to become whistleblowers. These rules are in tension with the lawyer's duties of confidentiality and avoiding conflicts predicated on attorney self-interest because they allow disclosure of client confidential information more broadly than do applicable ethics rules.
February 28, 2014Lawrence S. Spiegel and Esther E. BlousteinSecondary liability can be imposed on an ISP or distributor of a product used to commit infringement based upon claims of contributory infringement, inducement infringement or vicarious infringement. The contributory and inducement claims both focus on a defendant's contribution to the infringement and require that the defendant knows that direct infringement is occurring. These related claims, which provide independent ways to attack secondary infringement, differ in important respects.
February 28, 2014Alan R. FriedmanWhile law firms are increasingly modeling their business practices after their clients', one they have not been interested in mimicking is the accrual method of accounting.
February 28, 2014Gina Passarella

