Features
Litigation Support Information Governance
The treatment of personal identifiable information (PII) is quickly becoming a critical issue and should be on litigation support's risk and information governance agenda.
Features
Quarterly State Compliance Review
This edition of the Quarterly State Compliance Review looks at some legislation of interest to corporate lawyers that went into effect between May 1 and July 1, 2012, as well as some recent cases of interest. It includes two rulings from Delaware's courts, and decisions from California and New York on whether corporate officers may sue for wrongful termination.
Features
Conducting a Privacy Audit
With the proper tools, support from corporate management, a motivated audit team and a few guidelines, a privacy audit can be conducted using primarily internal resources and with little or no business disruption.
Features
<b><i>Online Extra:</b></i> A Big Win for Pharma Companies in Overtime Case
Pharmaceutical companies scored a major victory on June 18 when a divided U.S. Supreme Court held that the industry's sales representatives are not eligible for overtime pay.
Features
<B><I>Online Extra:</b></i> <b>Ninth Circuit Won't Rehear Prop 8 Case</b>
The next stop for the Proposition 8 case is the Supreme Court.The order denying rehearing leaves in place the court's February 2-1 ruling striking down the ban on equal protection grounds. The majority said the voter-enacted initiative served no purpose other than 'to lessen the status and human dignity' of gays.
Features
NJ Online Gambling Measure Clears Assembly Panel
Legislation to allow online gambling in New Jersey continues to make progress, despite concerns over its constitutionality.
Features
Ninth Circuit CFAA Case May Draw High Court Review
In <i>United States v. Nosal</i>, the U.S. Court of Appeals for the Ninth Circuit, <i>en banc</i>, held that the prohibition against "exceed[ing] authorized access" to a computer under the CFAA does not apply when an employee has been granted access to the company computer infrastructure but uses that access, against company policy and the obvious interests of the company, to copy valuable, confidential information in order to take business from the company. For various reasons, articulated well in the dissent by Judge Barry Silverman (joined by only one other judge), the Ninth Circuit is wrong.
Features
Taxing Online Sales ' The 2012 Update
As an update to our article in the June 2011 issue, this article highlights important case developments and new legal trends that have emerged with respect to the collection of state sales taxes by online retailers, as well as a general overview of online sales taxes and the constitutionality of click-through affiliate relationships.
Features
Applying Technology To the Business of Health Care
Advocates for online health services have long argued that the health care-services and health care-products industries could significantly enhance its ability to deliver quality products and services to consumers by using e-commerce to improve access to, and the timeliness and accuracy of, information, delivery and purchasing pertaining to the health care-sector supply chain.
Features
Asking Prospective Employees for Social Media Login Data
A recent trend in the human resources community is to ask prospective employees for usernames and passwords to social media sites to allow the hiring employer access to otherwise private information about an employment candidate's "online identity." e-Commerce companies, even though they are based on and operate through online activities, sometimes through social media, should carefully consider what principals and hiring parties in the firms may view as a natural inclination to examine an applicant's or an employee's social media postings and persona by demanding access to the sites.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- "Holy Fair Use, Batman": Copyright, Fair Use and the Dark KnightThe copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.Read More ›