Account

Sign in to access your account and subscription

Regulation

  • The DMCA prohibits the circumvention of digital rights management technologies and other similar content access or copy restrictions on copyrighted works. As such, it has long been understood that the circumvention of computer programs to enable interoperability of non-approved software applications ' a practice commonly referred to as "jailbreaking" ' was forbidden under the DMCA.

    July 02, 2013Michael S. Elkin and Thomas P. Lane
  • This articlelooks at the implications of the new gTLD program for attorneys and the Internet as a whole.

    July 02, 2013David K. Mitnick
  • UK Lord Justice Jackson's case management and litigation cost reforms are the most earth-shattering developments in recent UK civil procedure history, with serious ramifications that extend across the pond to U.S. companies.

    June 20, 2013Michael Flanagan and Adrian White
  • In recent years, the SEC has brought far fewer revenue recognition and other financial reporting cases than it had historically. That leads us naturally to wonder whether this trend will continue in the future. Not likely.

    June 20, 2013Jodi E. Lopez
  • For entertainment, sports and media (ESM) industries bidders ' and their counsel ' contemplating a merger-and-acquisition deal, last year's Delaware Supreme Court decision in RAA Management LLC v. Savage Sport Holdings Inc. highlighted the importance of assessing risk early in the due diligence process.

    May 31, 2013Sean A. Monroe, Jeannine Tang, Silvia Vannini
  • On May 15, the Federal Trade Commission (FTC) sent letters to more than 90 businesses, informing them that they could potentially be in violation of the Children's Online Privacy Protection Act (COPPA) when changes to the law go into effect on July 1.

    May 31, 2013Jenna Greene and Catharine Dunn
  • The 'Dendrite test,' has discouraged lawsuits whose real objective is identifying anonymous speakers. Prior to Dendrite, thousands of lawsuits were filed each year seeking to identify Internet speakers, and enforcement of subpoenas was almost automatic. Since Dendrite, both the number of lawsuits designed to identify Internet speakers and the automatic nature of the enforcement of those subpoenas has declined due to the broad application of Dendrite. Recently, an appellate court in Warren Hospital v. John Does (1-10) has limited the application of Dendrite.

    May 31, 2013Jonathan Bick
  • The calls for amending the Computer Fraud and Abuse Act (CFAA) have grown louder. In response, several bills have been introduced in Congress offering amendments to the CFAA. The question is whether Congress will use this opportunity to draft a law that attempts to reflect the interests of all U.S. citizens or simply increase the criminal penalties for violating the CFAA so as to appear tough on crime.

    May 31, 2013Peter J. Toren
  • On May 15, the Federal Trade Commission (FTC) sent letters to more than 90 businesses, informing them that they could potentially be in violation of the Children's Online Privacy Protection Act (COPPA) when changes to the law go into effect on July 1.

    May 31, 2013Jenna Greene and Catharine Dunn