Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


<b>Online Exclusive:</b> NSA Surveillance Decision Questioned on Conflict of Interest Grounds
August 24, 2006
Conservative legal group Judicial Watch charged that U.S. District Judge Anna Diggs Taylor, who last week struck down the National Security Agency's ('NSA') warrantless wiretapping program, has an undisclosed link with the ACLU, which brought the action against the NSA.
<b>Online Exclusive:</b> Survey Finds Data Loss Pervasive, But Companies' Controls Still Weak
August 24, 2006
A new study found that loss of laptops, PDAs, and portable data storage devices is bedeviling corporate America, but few companies are working comprehensively to address the problem.
CD: 10/3/06 - Integrating and Maximizing Business Development Training
August 24, 2006
Business development training requires a significant commitment of time and resources, and a vision of where participants in such a program want to be in their practice. A number of law firms have learned the hard way that simply providing a sales or coaching program does not necessarily guarantee results. Learn what it takes to implement the necessary strategies to get the most from your training efforts.
China's New Securities Law Being Put To Legal Test
August 23, 2006
Big four accounting firm Deloitte is being sued in a Shanghai court and being called before an administrative board in Beijing for having issued an unqualified audit opinion on a client with 'worrisome finances.' <br>It is always interesting to see how a court handles a new law for the first time. In business cases of first impression, the Chinese courts often look to foreign law, particularly United States law, in interpreting their own business laws and the Shanghai court will likely do so here.
<b>Online Exclusive:</b> As Use of Social-Network Web Sites from Workplace Computers Grows, So Should Employers' Concerns About Viruses and Spyware
August 22, 2006
Almost one in 600 profile pages on social-networking sites such as Facebook or MySpace are hosting some form of malware, according to a July survey of 5 billion Web requests conducted by computer security firm ScanSafe. Also, though social-networking sites have a reputation as being the exclusive domain of teenagers and college students, ScanSafe has found that they are increasingly common sources of corporate traffic, thus significantly raising the online security issue for employers.
<b>Online Exclusive:</b> District Court Judge Rules Against NSA Wiretapping; Ruling to Enforce Injunction Delayed Until Sept. 7
August 22, 2006
U.S. District Judge Anna Diggs Taylor recently ruled that the National Security Agency's ('NSA') warrantless surveillance program is unconstitutional, and she issued an injunction to end the surveillance program. Within a day of her ruling, the Justice Department filed a notice of appeal to the Sixth U.S. Circuit Court of Appeals. The case is <i>ACLU v. NSA</i>.
<b>Online Exclusive:</b> U.S. Transportation Department Loses Two Laptops
August 17, 2006
Twice in one week, the U.S. Department of Transportation ('DOT') disclosed that one of its employees in Florida had a laptop with confidential information stolen.
<b>Online Exclusive:</b> AOL Search Data Exposure Renews Interest in Data Warehousing Law
August 17, 2006
One of the U.S. House's leaders on telecommunications issues, Rep. Ed Markey (D-MA), recently renewed his effort to strengthen consumer privacy in the wake of AOL's sharing of customers' online data.
Teen Sues Mother for ID of Father
August 16, 2006
In a case that family law experts fear could set a dangerous precedent, a Michigan teenager is suing his mother to learn the identity of his father.

MOST POPULAR STORIES

  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • Rights and Obligations In Patent Licenses
    The owner of a commercially successful patent may have competing desires. On one hand, the patent owner wants to protect the patent and secure its maximum benefit; on the other hand, the patent owner wants to avoid enforcement litigation with competitors because it is expensive and puts the patent at risk.
    Read More ›
  • Foreseeability as a Bar to Proof of Patent Infringement
    The doctrine of equivalents is a rule of equity adopted more than 150 years ago by the U.S. Supreme Court. Prosecution history estoppel is a rule of equity that controls access to the doctrine. In May 2002, the Court was called upon to revisit the doctrine and the estoppel rule in <i>Festo Corp. v. Shoketsu Kinzoku Kogyo Kabushiki Co. Ltd.</i> Ultimately the Court reaffirmed the doctrine and expanded the estoppel rule, but not without inciting heated debate over the Court's rationale &mdash; especially since it included a new and controversial foreseeability test in its analysis for estoppel.
    Read More ›