Features
Nine Key Steps In a Proactive Cybersecurity Review
Securing your company's network and protecting your valuable data is difficult enough in today's Internet-driven economy. But to be treated by regulators and courts like an accessory to the crime after you've been hacked is truly adding insult to injury.
Features
SEC Takes First Significant Steps Toward Crowdfunding
Recently finalized rulemaking by the SEC to implement the Jumpstart Our Business Startups Act allows issuers of securities to engage in general solicitation and advertising to accredited investors in some private placement offerings of securities. Although the SEC's announcement leaves several notable questions unanswered, Rule 506(c) has the potential to enhance the utility of investment programs in the franchise world.
Features
Bloggers Want Same Rights as Mass Media
Bloggers, claiming that no distinction exists between blogs and traditional media, are seeking protection afforded by the First Amendment rights previously reserved for traditional media outlets. However, most courts do not afford bloggers the same rights given to traditional media.
Features
FTC Expanding Its Role in 'Internet of Things' Security
The FTC continued to expand its reach into cybersecurity last month when it took legal action against TRENDnet, which markets Web-connected home security cameras that allowed hundreds of live video feeds to be hacked and posted online.
Features
e-Discovery Platforms Are Not All the Same
The value of e-discovery technology varies, depending on a number of factors, including the provider that is hosting the data, the quality of technical support and the nature of the matter at hand. For that reason, there is no single one-size-fits-all platform.
Features
Accidental Access, 'Catfishing' and Unsecured Wi-Fi
The increasing use of Web browsing and other user data has stirred some users to reconsider the unspoken "bargain" that exists on social media and other interactive websites, namely, that privacy sacrifices in the form of targeted marketing and data collection subsidize free content and services and promote a robust online ecosystem. However, beyond the larger debate over digital privacy, new practices and technologies have emerged that do not neatly fit within the boundaries of existing privacy laws.
Features
ICANN's Trademark Clearinghouse Sees Slow Initial Take-Up
Later this year, the Internet is set to undergo a series of new and drastic changes with the first rollout of hundreds of new generic Top Level Domains (gTLDs). However, there is still a significant lack of participation from many top businesses that have yet to register and, as a result, are at greater risk of intellectual property infringement and potentially putting consumers at risk as well.
Features
Recent Issues in Cybersquatting Disputes
There are several pressing issues within the realm of cybersquatting, including: recent heightened scrutiny applied by courts to cybersquatters and the operators who host their domains; the various methods by which companies attempt to combat the problem; and whether cybersquatting will become a substantial problem on newer platforms, such as social networking sites and on the forthcoming new gTLDs.
Features
Why Not Throw in the Design of the Kitchen Sink?
When it comes to seeking patent protection for a new product, companies are often faced with a dilemma: delay patent filings until the product has proven commercial value, or gamble substantial resources trying to create a portfolio of utility and design patents for a product that may not be successful?
Features
<b><i>BREAKING NEWS</b></i>New Jersey Must Allow Gay Marriage, Judge Rules
A New Jersey judge ruled on Sept. 27 that the state must allow same-sex couples to marry, since failing to do so would deprive them of rights that now are guaranteed by the federal government, according to a report in <i>The New York Times</i>.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- "Holy Fair Use, Batman": Copyright, Fair Use and the Dark KnightThe copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.Read More ›