Features
Fifth Amendment Does Not Extend To 'Digital Person'
An acrimonious marital breakup has been known to bring out the worst in some people. Those battles increasingly are fought on the technology field, thereby leaving courts to determine complex personal rights issues in the context of grown-ups 'behaving badly.
Features
State, Federal Law Differ on Franchisors As Joint Employers
It seems that the definition of employer under state law is becoming more restrictive but the definition under federal statutes has become more flexible. The reason is a federal political agenda to empower the National Labor Relations Act to encourage collective bargaining of employees of franchises.
Features
SEC Potentially Targets CCOs for Cybersecurity Lapses
Two recent speeches by Securities and Exchange Commission (SEC) officials likely got the attention of every Chief Compliance Officer (CCO). CCOs would be well advised to carefully review and implement where appropriate the SEC's latest cybersecurity guidance.
Features
Four Keys to Litigation Technology Innovation in the Next Five Years
Electronic discovery is a complex business that requires continuous professional learning from litigation team members and ongoing innovation from technology solution providers. To help stimulate discussion and drive innovation, The Legal Innovation 2020 Working Group was formed at the beginning of 2015 in order to help legal-industry leaders identify the keys to success over the next five years.
Features
Second Circuit 'Affirms Fair Use
On Oct. 16, in <i>Authors Guild v. Google,</i> the Second Circuit affirmed a U.S. District judge's holding that Google's mass digitization of more than 20 million books from major university libraries in order to enable users of the Google Books website constitutes fair use.
Features
Safe Harbor for Service Providers under the Anticybersquatting Act
GoDaddy.com has been the prevailing defendant in two major lawsuits under the Anticybersquatting Consumer Protection Act (ACPA). In both cases, plaintiffs sought to hold a defendant liable for contributory or secondary infringement rather than "direct" cybersquatting under the ACPA. The principal reason for plaintiffs' lack of success lies in a fundamental misunderstanding of the ACPA.
Features
Contracting with Minors
One of the fundamental principles of U.S. contract law is that a party must have the capacity to enter into a contract in order to be bound. Minors, as a general rule, lack this capacity. As a result, any contract made with a minor might not be enforceable. Yet in certain circumstances, contracts with minors are commonplace. The following identifies some risks, some mitigating solutions and the limitations of those solutions when contracting with a minor.
Features
Data Sharing In the Cloud
Storing and sharing data "in the cloud" has become, in many instances, a business necessity. The practical and economic advantages of cloud computing are clear ' it eliminates the need to send client data via traditional, costly methods, and is significantly less expensive than building and maintaining the same data storage capacity in-house.
Columns & Departments
Court Watch
Franchisees and Dealers Should Plead Causation In Actions Against the Government <br>Michigan Court Transfers Case Brought By 41 Franchisees to Franchisor's Home State
Features
Managing Security Risks During Labor Disputes
Every company with union workers faces the risk of a labor dispute. Identifying any business risks and then managing them is a priority for executive decision-makers who must ensure that the company delivers its promises to stockholders, customers and employees. The process is well defined in business terms:
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Clause & EffectNet-Profit Rights/Movies Based on TV Shows<br>Insurance/Contract-Breach Exclusion<br>Insurance/Copyright-Infringement CoverageRead More ›
- Rights and Obligations In Patent LicensesThe owner of a commercially successful patent may have competing desires. On one hand, the patent owner wants to protect the patent and secure its maximum benefit; on the other hand, the patent owner wants to avoid enforcement litigation with competitors because it is expensive and puts the patent at risk.Read More ›
- Foreseeability as a Bar to Proof of Patent InfringementThe doctrine of equivalents is a rule of equity adopted more than 150 years ago by the U.S. Supreme Court. Prosecution history estoppel is a rule of equity that controls access to the doctrine. In May 2002, the Court was called upon to revisit the doctrine and the estoppel rule in <i>Festo Corp. v. Shoketsu Kinzoku Kogyo Kabushiki Co. Ltd.</i> Ultimately the Court reaffirmed the doctrine and expanded the estoppel rule, but not without inciting heated debate over the Court's rationale — especially since it included a new and controversial foreseeability test in its analysis for estoppel.Read More ›