Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Regulation

Features

Nine Key Steps In a Proactive Cybersecurity Review Image

Nine Key Steps In a Proactive Cybersecurity Review

Jason Weinstein

Securing your company's network and protecting your valuable data is difficult enough in today's Internet-driven economy. But to be treated by regulators and courts like an accessory to the crime after you've been hacked is truly adding insult to injury.

Features

SEC Takes First Significant Steps Toward Crowdfunding Image

SEC Takes First Significant Steps Toward Crowdfunding

Joel R. Buckberg, Taylor K. Wirth

Recently finalized rulemaking by the SEC to implement the Jumpstart Our Business Startups Act allows issuers of securities to engage in general solicitation and advertising to accredited investors in some private placement offerings of securities. Although the SEC's announcement leaves several notable questions unanswered, Rule 506(c) has the potential to enhance the utility of investment programs in the franchise world.

Features

Bloggers Want Same Rights as Mass Media Image

Bloggers Want Same Rights as Mass Media

Jonathan Bick

Bloggers, claiming that no distinction exists between blogs and traditional media, are seeking protection afforded by the First Amendment rights previously reserved for traditional media outlets. However, most courts do not afford bloggers the same rights given to traditional media.

Features

FTC Expanding Its Role in 'Internet of Things' Security Image

FTC Expanding Its Role in 'Internet of Things' Security

Sue Reisinger

The FTC continued to expand its reach into cybersecurity last month when it took legal action against TRENDnet, which markets Web-connected home security cameras that allowed hundreds of live video feeds to be hacked and posted online.

Features

e-Discovery Platforms Are Not All the Same Image

e-Discovery Platforms Are Not All the Same

Steve Hartwig

The value of e-discovery technology varies, depending on a number of factors, including the provider that is hosting the data, the quality of technical support and the nature of the matter at hand. For that reason, there is no single one-size-fits-all platform.

Features

Accidental Access, 'Catfishing' and Unsecured Wi-Fi Image

Accidental Access, 'Catfishing' and Unsecured Wi-Fi

Richard Raysman & Peter Brown

The increasing use of Web browsing and other user data has stirred some users to reconsider the unspoken "bargain" that exists on social media and other interactive websites, namely, that privacy sacrifices in the form of targeted marketing and data collection subsidize free content and services and promote a robust online ecosystem. However, beyond the larger debate over digital privacy, new practices and technologies have emerged that do not neatly fit within the boundaries of existing privacy laws.

Features

ICANN's Trademark Clearinghouse Sees Slow Initial Take-Up Image

ICANN's Trademark Clearinghouse Sees Slow Initial Take-Up

Jan Corstens

Later this year, the Internet is set to undergo a series of new and drastic changes with the first rollout of hundreds of new generic Top Level Domains (gTLDs). However, there is still a significant lack of participation from many top businesses that have yet to register and, as a result, are at greater risk of intellectual property infringement and potentially putting consumers at risk as well.

Features

Recent Issues in Cybersquatting Disputes Image

Recent Issues in Cybersquatting Disputes

Richard Raysman & Peter Brown

There are several pressing issues within the realm of cybersquatting, including: recent heightened scrutiny applied by courts to cybersquatters and the operators who host their domains; the various methods by which companies attempt to combat the problem; and whether cybersquatting will become a substantial problem on newer platforms, such as social networking sites and on the forthcoming new gTLDs.

Features

Why Not Throw in the Design of the Kitchen Sink? Image

Why Not Throw in the Design of the Kitchen Sink?

Christopher P. Foley, Elizabeth D. Ferrill & Larry M. Sandell

When it comes to seeking patent protection for a new product, companies are often faced with a dilemma: delay patent filings until the product has proven commercial value, or gamble substantial resources trying to create a portfolio of utility and design patents for a product that may not be successful?

Features

<b><i>BREAKING NEWS</b></i>New Jersey Must Allow Gay Marriage, Judge Rules Image

<b><i>BREAKING NEWS</b></i>New Jersey Must Allow Gay Marriage, Judge Rules

ALM Staff & Law Journal Newsletters

A New Jersey judge ruled on Sept. 27 that the state must allow same-sex couples to marry, since failing to do so would deprive them of rights that now are guaranteed by the federal government, according to a report in <i>The New York Times</i>.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • "Holy Fair Use, Batman": Copyright, Fair Use and the Dark Knight
    The copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.
    Read More ›