Features
Courts Conflict on Anonymous, Allegedly Defamatory Online Speech
Anyone spending 10 minutes on the Internet reading content is often assaulted by angry and coarse language supporting frequently outrageous opinions. The First Amendment concepts of free speech have reached either new highs or discouraging lows when dealing with opinions and blogs on the Internet. In this unrestricted environment, can individuals or businesses protect their reputations?
Features
Evolution of the Patent Infringement Safe Harbor
Since its enactment in 1984, the scope of the "safe harbor" provision of the patent code has been in flux. The provision is intended to exempt from infringement certain acts related to the development of drugs and medical devices that are subject to FDA regulatory approval, to enable competitors to immediately enter the market upon patent expiration. However, the contours and boundaries of the safe harbor have been a consistent source of controversy in the courts.
Features
Collecting Social Security Numbers
In the first half of 2014, at least 96 significant data breaches were reported, compromising more than 2.2 million records. Of these breaches, at least 46 involved records that may have contained Social Security Numbers (SSNs). What the affected businesses may not know is that the mere collection of SSNs may have put them in violation of state laws, in addition to the liability they may now face for having failed to protect the SSN information.
Features
CFPB Gets Real About Bitcoin Risks
Consumers should be cautious when using bitcoin and alert the U.S. Consumer Financial Protection Bureau (CFPB) to any problems with the virtual money, the agency said last month after a government watchdog this summer urged the CFPB to engage more on the currency.
Features
Valuation of a Law Firm and a Law Practice
Lawyers leaving a law practice have an economic interest in monetizing their career-long investment in building a client portfolio and a referral network. How each lawyer has accomplished this depends on his or her particular practice, market and style. But while the means may vary, the results are the same ' access to clients who have legal needs. And this is the value the acquirers wish to capture.
Features
The DNA of an In-House Corporate e-Discovery Project Manager
What is the DNA of an in-house e-discovery project manager ' and how can you become one, whether you are a lawyer or a technician? Let's define an in-house e-discovery project manager, examine in-house corporate hiring trends and endeavor to understand what the corporate appetite is for grooming talent or, conversely, for hiring experienced e-discovery professionals.
Features
Is It a 'Cyberattack' or a 'Data-Breach Incident'?
This article goes beyond the nuts and bolts of how to respond to a data-breach incident, and offers some lessons learned from the frontlines of the cybersecurity war to help companies successfully navigate the legal and public-relations minefield that ensues.
Features
Insurance Coverage Disputes over Data Breaches
Each day, businesses become progressively more dependent on computers and the Internet to gather, store and protect information. But, as sophisticated as this technology may be, it has also proven to be susceptible to breaches, which have time and again resulted in the unauthorized access of confidential information.
Features
Anti-Waiver Arguments and Enforcement of Forum-Selection Clauses
Anti-waiver provisions in state franchise acts have traditionally been used to trump the venue designated in the franchise agreement and to successfully transfer venue to the franchisee's home state. However, a recent decision from the U.S. District Court for the Eastern District of Michigan has added weight to a small but growing body of cases enforcing forum-selection clauses against franchisees that operate in states with franchise acts containing anti-waiver provisions.
Features
Protecting Law Firms from Increasing Cyberattacks
Cyberattacks are increasing at a startling rate in the business community, not only by hackers for personal intellectual skullduggery, but cyberattacks aimed at obtaining sensitive information. Law firms have become major targets of these illegal attacks, which are aimed at discovering and pilfering the entire subject matter of a commercial operation.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Internet Goods and Product LiabilityThe Internet's value arises in part from its ability to provide images, data and content quickly and at little cost. This ability results from the fact that Internet products — whether they be images, data or content — are each reduced to a digital format. Sharing products that have been so reduced may result in product liability.Read More ›
- Compliance Officers: Recent Regulatory Guidance and Enforcement Actions and Mitigating the Risk of Personal LiabilityThis article explores legal developments over the past year that may impact compliance officer personal liability.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- Understanding the Potential Pitfalls Arising From Participation in Standards BodiesChances are that if your company is involved in research and development of new technology there is a standards setting organization exploring the potential standardization of such technology. While there are clear benefits to participation in standards organizations — keeping abreast of industry developments, targeting product development toward standard compliant products, steering research and intellectual property protection into potential areas of future standardization — such participation does not come without certain risks. Whether you are in-house counsel or outside counsel, you may be called upon to advise participants in standard-setting bodies about intellectual property issues or to participate yourself. You may also be asked to review patent policy of the standard-setting body that sets forth the disclosure and notification requirements with respect to patents for that organization. Here are some potential patent pitfalls that can catch the unwary off-guard.Read More ›
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
