Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Regulation

Features

Combating Counterfeiting Image

Combating Counterfeiting

Camille M. Miller, Elizabeth Lai Featherman

Online counterfeit sellers are increasingly more sophisticated and are engaging in social media counterfeiting to exploit social media tools to bolster their sales of counterfeit products online.

Features

Quarterly State Compliance Review Image

Quarterly State Compliance Review

Sandra Feldman

This edition of the Quarterly State Compliance Review looks at some legislation of interest to corporate lawyers that went into effect between Jan. 1, 2014 and April 1, 2014. It also looks at some recent decisions of interest, including three from the Delaware courts.

Features

Supreme Court Grants <i>Cert</i> in <i>Aereo</i> Case Image

Supreme Court Grants <i>Cert</i> in <i>Aereo</i> Case

J. Alexander Lawrence, David S. Brown

<i>Aereo</i>may turn out to be one of the most important copyright decisions since enactment of the Copyright Act of 1976, with potential wide-ranging ramifications for the television industry and the fast-growing cloud computing industry.

Features

The Implied Covenant of Good Faith and Fair Dealing under U.S. Law Image

The Implied Covenant of Good Faith and Fair Dealing under U.S. Law

Beata Krakus

It is a truth universally acknowledged that even the most well-written agreement never covers all potential issues that may arise in the future, and that when the rubber hits the road, the parties to the agreement never interpret its terms the same way.

Features

Privacy and Ethics For Social Media In Investigations Image

Privacy and Ethics For Social Media In Investigations

William Michael Jr. & Laura Hammargren

It begins with a name ' perhaps an employee alleged to have been involved in misconduct or a suspected whistleblower. Regardless of the origin of identity, if the person is relevant to a company's internal investigation, whatever information that can be provided is power for the company, the power to make informed decisions.

Features

The Ethical Boundaries of Attorney Whistleblowers Image

The Ethical Boundaries of Attorney Whistleblowers

Lawrence S. Spiegel & Esther E. Bloustein

In recent years, federal legislation has encouraged attorneys to become whistleblowers. These rules are in tension with the lawyer's duties of confidentiality and avoiding conflicts predicated on attorney self-interest because they allow disclosure of client confidential information more broadly than do applicable ethics rules.

Features

Key Privacy Law Developments Image

Key Privacy Law Developments

Jay Edelson & Chandler Givens

Earlier this year, President Obama addressed the nation to outline steps he will take to rein in the surveillance activities of the National Security Agency. Obama noted that "challenges to our privacy do not come from government alone." The President's remarks were the culmination of a year in which consumer privacy issues have roared into the public narrative, and they underscore a theme that privacy lawyers had already sensed about their practice by the end of 2013: The tide is changing.

Features

DE Supreme Court Eases Social Media Authentication Image

DE Supreme Court Eases Social Media Authentication

Jeff Mordock

Social media postings can be submitted as trial evidence as long as the party introducing the evidence can demonstrate to the judge that a jury could reasonably conclude the postings are authentic, the Delaware Supreme Court has ruled.

Features

Best Practices for Comprehensive Searchability Image

Best Practices for Comprehensive Searchability

Dean Sappey

Most law firms now proudly proclaim that they have implemented efficient and secure document management systems, systems in which they have invested significant dollars and even more in "sweat equity." The end goal of these systems is to ensure that all documents are stored securely, and perhaps more importantly, can be found quickly and easily.

Features

We Need to Cut a New Deal on Communications Privacy Image

We Need to Cut a New Deal on Communications Privacy

David R. Johnson

It is (high) time to rewrite and modernize the law that regulates access to our private communications and to the detailed information those communications automatically create.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The 'Sophisticated Insured' Defense
    A majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.
    Read More ›
  • Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric Code
    In an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.
    Read More ›