Features
Courts Conflict on Anonymous, Allegedly Defamatory Online Speech
Anyone spending 10 minutes on the Internet reading content is often assaulted by angry and coarse language supporting frequently outrageous opinions. The First Amendment concepts of free speech have reached either new highs or discouraging lows when dealing with opinions and blogs on the Internet. In this unrestricted environment, can individuals or businesses protect their reputations?
Features
Evolution of the Patent Infringement Safe Harbor
Since its enactment in 1984, the scope of the "safe harbor" provision of the patent code has been in flux. The provision is intended to exempt from infringement certain acts related to the development of drugs and medical devices that are subject to FDA regulatory approval, to enable competitors to immediately enter the market upon patent expiration. However, the contours and boundaries of the safe harbor have been a consistent source of controversy in the courts.
Features
Collecting Social Security Numbers
In the first half of 2014, at least 96 significant data breaches were reported, compromising more than 2.2 million records. Of these breaches, at least 46 involved records that may have contained Social Security Numbers (SSNs). What the affected businesses may not know is that the mere collection of SSNs may have put them in violation of state laws, in addition to the liability they may now face for having failed to protect the SSN information.
Features
CFPB Gets Real About Bitcoin Risks
Consumers should be cautious when using bitcoin and alert the U.S. Consumer Financial Protection Bureau (CFPB) to any problems with the virtual money, the agency said last month after a government watchdog this summer urged the CFPB to engage more on the currency.
Features
Valuation of a Law Firm and a Law Practice
Lawyers leaving a law practice have an economic interest in monetizing their career-long investment in building a client portfolio and a referral network. How each lawyer has accomplished this depends on his or her particular practice, market and style. But while the means may vary, the results are the same ' access to clients who have legal needs. And this is the value the acquirers wish to capture.
Features
The DNA of an In-House Corporate e-Discovery Project Manager
What is the DNA of an in-house e-discovery project manager ' and how can you become one, whether you are a lawyer or a technician? Let's define an in-house e-discovery project manager, examine in-house corporate hiring trends and endeavor to understand what the corporate appetite is for grooming talent or, conversely, for hiring experienced e-discovery professionals.
Features
Is It a 'Cyberattack' or a 'Data-Breach Incident'?
This article goes beyond the nuts and bolts of how to respond to a data-breach incident, and offers some lessons learned from the frontlines of the cybersecurity war to help companies successfully navigate the legal and public-relations minefield that ensues.
Features
Insurance Coverage Disputes over Data Breaches
Each day, businesses become progressively more dependent on computers and the Internet to gather, store and protect information. But, as sophisticated as this technology may be, it has also proven to be susceptible to breaches, which have time and again resulted in the unauthorized access of confidential information.
Features
Anti-Waiver Arguments and Enforcement of Forum-Selection Clauses
Anti-waiver provisions in state franchise acts have traditionally been used to trump the venue designated in the franchise agreement and to successfully transfer venue to the franchisee's home state. However, a recent decision from the U.S. District Court for the Eastern District of Michigan has added weight to a small but growing body of cases enforcing forum-selection clauses against franchisees that operate in states with franchise acts containing anti-waiver provisions.
Features
Protecting Law Firms from Increasing Cyberattacks
Cyberattacks are increasing at a startling rate in the business community, not only by hackers for personal intellectual skullduggery, but cyberattacks aimed at obtaining sensitive information. Law firms have become major targets of these illegal attacks, which are aimed at discovering and pilfering the entire subject matter of a commercial operation.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- How to TOOT Your Own Horn: Exceptional Self EvaluationsIt's that time again. As the year comes to a close many firms are beginning the associate review process. Even if your firm does not have a formal review process I recommend that you write a self-evaluation that outlines your achievements and specifies your goals for the coming year.Read More ›
- The DOJ's New Parameters for Evaluating Corporate Compliance ProgramsThe parameters set forth in the DOJ's memorandum have implications not only for the government's evaluation of compliance programs in the context of criminal charging decisions, but also for how defense counsel structure their conference-room advocacy seeking declinations or lesser sanctions in both criminal and civil investigations.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The FTC Gets Into the College Athlete NIL GameAs national champions are crowned in men's and women's basketball, hundreds of thousands of college athletes are entering the influencer marketplace for the first time and now find themselves attractive candidates in the fast growing influencer marketing arena. With influencer marketing potentially providing a 5x return on investment, many brands are eager to get into the industry, but it doesn't come without risks as the FTC Commissioner is taking a closer look at the use of influencers for marketing.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
