Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Regulation

Features

Social Media Invades and Modernizes Employment Practices Image

Social Media Invades and Modernizes Employment Practices

Morey Raiskin & Celeste Thacker

For employers, social media sites present a potential treasure trove of information on applicants, but mining this information for use in recruiting, hiring, firing and monitoring of employees is fraught with risk. Nonetheless, some studies show that 40% of employers search social media during the hiring process. While there are not currently any laws in the United States forbidding employers from gleaning information from social media, improper use can get them into trouble.

Features

Back to School Image

Back to School

Erin Winters

With schools back in session, now is the time for employers to review hiring, payment and scheduling practices for workers under the age of 18. The myriad federal and state child labor laws that employers must heed range from work permit requirements to the hours and type of work performed, all of which vary based on an employee's age and whether school is in session.

Features

Criminal Subpoenas for Online Data Image

Criminal Subpoenas for Online Data

Ben Barnett & Rebecca Kahan Waldman

Never before has so much personal data been available anywhere but also completely outside the immediate control of the person who created it. Companies like Google and Facebook are the entities responding to government search warrants and subpoenas for individuals' personal information. Federal courts continue to struggle ' and sharply disagree ' over the scope of Fourth Amendment protections for this data.

Features

<i><b>Online Extra:</i></b>Facebook Fights to Snuff Out Privacy Suit Image

<i><b>Online Extra:</i></b>Facebook Fights to Snuff Out Privacy Suit

Ross Todd

U.S. District Judge Phyllis Hamilton was set last month to be the latest jurist in the Northern District of California to grapple with how decades-old federal wiretapping laws apply to today's technology.

Features

Interpreting China's New Trademark Law Image

Interpreting China's New Trademark Law

Xiang Gao

Despite China's quotas on film and TV program imports, and the country's aggressive content restrictions, the U.S. entertainment industry continues to look at the world's second largest economy as essential for expanding the international audience for U.S. productions. With that in mind, this article examines the first major amendments to China's trademark law in more than 20 years.

Features

Courts Conflict on Anonymous, Allegedly Defamatory Online Speech Image

Courts Conflict on Anonymous, Allegedly Defamatory Online Speech

Richard Raysman & Peter Brown

Anyone spending 10 minutes on the Internet reading content is often assaulted by angry and coarse language supporting frequently outrageous opinions. The First Amendment concepts of free speech have reached either new highs or discouraging lows when dealing with opinions and blogs on the Internet. In this unrestricted environment, can individuals or businesses protect their reputations?

Features

Evolution of the Patent Infringement Safe Harbor Image

Evolution of the Patent Infringement Safe Harbor

Sarah A. Bennington & Anthony M. Insogna

Since its enactment in 1984, the scope of the "safe harbor" provision of the patent code has been in flux. The provision is intended to exempt from infringement certain acts related to the development of drugs and medical devices that are subject to FDA regulatory approval, to enable competitors to immediately enter the market upon patent expiration. However, the contours and boundaries of the safe harbor have been a consistent source of controversy in the courts.

Features

Collecting Social Security Numbers Image

Collecting Social Security Numbers

Nicole Pszczolkowski & L. Elise Dieterich

In the first half of 2014, at least 96 significant data breaches were reported, compromising more than 2.2 million records. Of these breaches, at least 46 involved records that may have contained Social Security Numbers (SSNs). What the affected businesses may not know is that the mere collection of SSNs may have put them in violation of state laws, in addition to the liability they may now face for having failed to protect the SSN information.

Features

CFPB Gets Real About Bitcoin Risks Image

CFPB Gets Real About Bitcoin Risks

Andrew Ramonas

Consumers should be cautious when using bitcoin and alert the U.S. Consumer Financial Protection Bureau (CFPB) to any problems with the virtual money, the agency said last month after a government watchdog this summer urged the CFPB to engage more on the currency.

Features

Valuation of a Law Firm and a Law Practice Image

Valuation of a Law Firm and a Law Practice

James D. Cotterman

Lawyers leaving a law practice have an economic interest in monetizing their career-long investment in building a client portfolio and a referral network. How each lawyer has accomplished this depends on his or her particular practice, market and style. But while the means may vary, the results are the same ' access to clients who have legal needs. And this is the value the acquirers wish to capture.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Legal Possession: What Does It Mean?
    Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Cutting Off the Stream: How United States v. Silver Affects "Stream of Benefits" or "Retainer" Bribery
    Although the court stressed that, by vacating certain of former NY State Assembly Speaker Sheldon Silver's counts of conviction, it was clarifying and not altering the "as opportunities arise" theory, it nevertheless emphasized that this theory requires particularity with respect to the "question or matter" that is the subject of the bribe payor and recipient's corrupt agreement.
    Read More ›