Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Features

Franchise Industry Sees Victory in Debit Card Fee Lawsuit Image

Franchise Industry Sees Victory in Debit Card Fee Lawsuit

Zoe Tillman & Kevin Adler

U.S. District Court Judge Richard Leon struck down Federal Reserve regulations on debit-card transaction fees on July 31, a victory for retailers that process high numbers of low-ticket transactions. Leon found that the Fed adopted rules that "inappropriately" inflated fees by billions of dollars.

Columns & Departments

News Briefs Image

News Briefs

ALM Staff & Law Journal Newsletters

Franchise Relationship Law Tabled in CA Assembly <br>New Franchise-Relationship Bill Proposed in PA

Limited Exclusion Orders at the ITC Image

Limited Exclusion Orders at the ITC

Maximilienne Bishop & Elizabeth A. Niemeyer

The United States International Trade Commission (ITC) has the authority to stop unfair trade practices, including the importation of products found to infringe a valid U.S. patent. But does that authority automatically extend to downstream products incorporating a relatively insignificant infringing component ' such as an automobile that happens to include an infringing light-emitting diode? And is the ITC required to balance the parties' interests and consider factors such as the value of an infringing component compared to the overall value of the imported downstream product?

Features

<b><i>Online Extra</b></i>White House Offers Incentives for Cybersecurity Program Image

<b><i>Online Extra</b></i>White House Offers Incentives for Cybersecurity Program

Andrew Ramonas

President Barack Obama's administration has drafted a potential recipe for sweetening its voluntary corporate cybersecurity program. The program is under development at the White House and is aimed at utility companies and other businesses that are key to U.S. infrastructure.

Features

Accidental Access, 'Catfishing' and Unsecured Wi-Fi Image

Accidental Access, 'Catfishing' and Unsecured Wi-Fi

Richard Raysman & Peter Brown

This article discusses several contemporary privacy issues, including: whether accidental access to another's e-mail account constitutes unauthorized computer access; whether the use of a fictitious online identity can lead to civil liability; and whether the account holder of an unsecured home Wi-Fi network can be found liable for infringing activities by third parties using the network.

Features

What You Need to Protect Your Brand In A New gTLD World Image

What You Need to Protect Your Brand In A New gTLD World

David K. Mitnick

In order to deal with an expanding Internet, brand owners need to understand how to use a variety of tools to handle the different brand protection and legal challenges that will be presented. For brand owners looking at the New gTLD space, formulating a trademark protection strategy should be viewed as an important tool on an entire tool belt of protection strategies that together can be used as a comprehensive plan.

Features

Making Bitcoins Legit Image

Making Bitcoins Legit

Juan Forrer

It may be a while before Kathleen Moriarty lets clients pay her in bitcoin, but the Katten Muchin Rosenman partner is doing her part to help legitimize the digital currency derided as speculative and risky by some prominent economists.

Features

Franchise Compliance Image

Franchise Compliance

Evan Hackel, CFE

Every franchise system chief executive encounters situations in which a franchisee has a good reason for not complying with a rule, or in which the infraction is fairly minor. But how can a franchisor be sure about where to draw the line and how strictly to enforce the rules that are set out in the franchise agreement or operations manual?

Features

Joint Defense Agreement Considerations in NPE Patent Litigation Image

Joint Defense Agreement Considerations in NPE Patent Litigation

James W. Soong

Accused infringers in patent litigation, especially against non-practicing entities (NPEs), often form joint defense groups to defend against common claims brought in one or more actions. A written agreement of the joint defense group can make plain the respective rights and obligations of each group member and evidence to the court a requisite alignment of common interest underpinning the group. The following is a selection of relevant considerations to support productive group interaction through appropriate provision in the joint defense agreement.

Features

e-Mail Signature Ruled Valid To Enforce Settlement Image

e-Mail Signature Ruled Valid To Enforce Settlement

Joel Stashenko

Signing an e-mail attesting to the substance of a negotiated agreement with the typed name of the sender constitutes a binding and enforceable stipulation of the settlement under CPLR 2104, a New York state appeals panel ruled.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Right to Associate in the Defense
    The "right to associate" permits the insurer to work with the insured to investigate, defend, or settle a claim. Such partnerships protect the insurer and can prove beneficial to the insured's underlying case and ultimate exposure.
    Read More ›