Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Regulation

Features

The New Attorney General and You Image

The New Attorney General and You

Jeffrey T. Green

Loretta Lynch, formerly United States Attorney for the Eastern District of New York, likely will be the newly confirmed Attorney General of the United States by the time you read this. As spectacle, a changing of the guard is always worthy of note. But for others who are embroiled in or worried about investigations, the change may matter a great deal.

Features

<b><i>Online Extra:</b></i> New Russian Data Residency Law Will Soon Take Effect Image

<b><i>Online Extra:</b></i> New Russian Data Residency Law Will Soon Take Effect

Ed Silverstein

There is a new Russian data residency law that will likely impact many companies, which somehow have business connections with Russia.

Columns & Departments

IP News Image

IP News

Jeffrey S. Ginsberg & Brooke Hazan

Federal Circuit: Application by PTAB of Broadest Reasonable Interpretation Standard in Claim Construction Upheld Under the AIA

Features

When Your Data Goes Viral Image

When Your Data Goes Viral

Sherilyn Pastor & Kelly Lloyd

As discussed in Part One of this article, a data breach can jeopardize a company's confidential information such as client records, trade secrets, privileged legal information, or employee records. Although many associate data breaches with hackers or cyberattacks, human error, such as a mistake in computer coding or losing a company laptop, also results in significant breaches.

Features

2016 Budget Targets Retirement Image

2016 Budget Targets Retirement

Lawrence L. Bell

Last month, the Obama Administration's Fiscal Year 2016 Budget was published, along with the Department of Treasury's Greenbook, a detailed explanation of the President's proposed budget. Because the proposed legislation must pass a Republican led Congress, the President's budget may be "aspirational." It is a good indicator of the tools the Administration is prepared to use to fund its wish list.

Features

Raising the Stakes Image

Raising the Stakes

Marjorie J. Peerce, Charles A. Stillman & Elizabeth J. Lee

The government has become increasingly aggressive in pursuing criminal claims not only against corporations, but also against in-house counsel and compliance personnel, for conduct once treated almost exclusively as civil.

Features

Federal Judge Rules For Defendant in Porn Copyright Case Image

Federal Judge Rules For Defendant in Porn Copyright Case

Saranac Hale Spencer

An anonymous <i>pro se</i> defendant has beaten copyright infringement claims brought against him in federal court by a maker of pornographic videos. The defendant's victory runs counter to the result in a similar case in front of a different Eastern District judge.

Features

How to Obtain Social Media Data For Defending Lawsuits Image

How to Obtain Social Media Data For Defending Lawsuits

Emily T. Acosta & Eric P. Conn

Obtaining social media user content under most circumstances is extremely difficult ' unless you use the correct strategy. Simply sending discovery requests without a basic understanding of the information available is a fool's errand. It is pivotal that a practitioner who wants to conduct formal discovery of social media user content understand how each site stores and communicates its data.

Features

Disputes over Noise Levels from Live Performances Image

Disputes over Noise Levels from Live Performances

Jay Stapleton

Noise complaints have long been an occupational hazard for venue operators, musicians and concert promoters. The surge in the electronic dance music scene has added to the number of complaints. What might be enjoyable entertainment to one person may sound like a thunderous racket to another.

Features

Law Firms Aren't Immune to Cybersecurity Risks Image

Law Firms Aren't Immune to Cybersecurity Risks

Jason Straight

Although law firms have managed to remain off the list of the year's biggest data breach victims, firms watching cybersecurity trends most closely are feeling increasingly uneasy about their own security posture.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Bankruptcy Sales: Finding a Diamond In the Rough
    There is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.
    Read More ›
  • Compliance Officers and Law Enforcement: Friends or Foes?
    <b><i>Part Two of a Two-Part Article</b></i><p>As we saw in Part One, regulators have recently shown a tendency to focus on compliance officers who they deem to have failed to ensure that the compliance and anti-money laundering (AML) programs that they oversee adequately prevented corporate wrongdoing, and there are several indications that regulators will continue to target compliance officers in 2018 in actions focused on Bank Secrecy Act/AML compliance.
    Read More ›
  • Artist Challenges Copyright Office Refusal to Register Award-Winning AI-Assisted Work
    Copyright law has long struggled to keep pace with advances in technology, and the debate around the copyrightability of AI-assisted works is no exception. At issue is the human authorship requirement: the principle that a work must have a human author to be eligible for copyright protection. While the Copyright Office has previously cited this "bedrock requirement of copyright" to reject registrations, recent decisions have focused on the role of human authorship in the context of AI.
    Read More ›