Utah Judge Rules Against Aereo's TV Antennas
February 28, 2014
Television's old guard finally opened a hole in Aereo Inc.'s armor last month, winning a ruling that left the Internet TV upstart and its lawyers fighting to limit the damage ahead of arguments at the U.S. Supreme Court in April.
Hysteria Grips Bitcoin Market As Apple Removes Bitcoin Wallet App from Its Store
February 28, 2014
Despite the active hostility of the Chinese, Indian and Russian governments, the spread of bitcoins throughout the world was untrammeled until last month. In a series of dramatic arrests and prosecutions, the U.S. government began an active campaign against the use of bitcoins for questionable purposes.
Supreme Court Grants <i>Cert</i> in <i>Aereo</i> Case
February 28, 2014
<i>Aereo</i>may turn out to be one of the most important copyright decisions since enactment of the Copyright Act of 1976, with potential wide-ranging ramifications for the television industry and the fast-growing cloud computing industry.
Privacy and Ethics For Social Media In Investigations
February 28, 2014
It begins with a name ' perhaps an employee alleged to have been involved in misconduct or a suspected whistleblower. Regardless of the origin of identity, if the person is relevant to a company's internal investigation, whatever information that can be provided is power for the company, the power to make informed decisions.
Pushing the Technology Envelope in and Out of the Courtroom
February 28, 2014
Technological advancements have dramatically improved the speed, capabilities and, in most cases, the cost-effectiveness in which deposition, discovery and pre-trial services are provided. Companies that have embraced the latest developments in jury research and selection technology ' particularly social media monitoring tools ' are best situated to thrive in the current environment.
Content Owners' Pursuit of Secondary Infringement Claims
February 28, 2014
Secondary liability can be imposed on an ISP or distributor of a product used to commit infringement based upon claims of contributory infringement, inducement infringement or vicarious infringement. The contributory and inducement claims both focus on a defendant's contribution to the infringement and require that the defendant knows that direct infringement is occurring. These related claims, which provide independent ways to attack secondary infringement, differ in important respects.
White House Uploads U.S. Cybersecurity Framework
February 28, 2014
President Barack Obama's administration on Feb. 12 released its much-anticipated voluntary cybersecurity framework, giving U.S. companies a common handbook on how they can try to fend off hackers.
DE Supreme Court Eases Social Media Authentication
February 28, 2014
Social media postings can be submitted as trial evidence as long as the party introducing the evidence can demonstrate to the judge that a jury could reasonably conclude the postings are authentic, the Delaware Supreme Court has ruled.