Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search

We found 2,562 results for "Entertainment Law & Finance"...

Role for Patents In Videogame Industry
September 28, 2006
For videogame developers, publishers and investors, the most important asset is the intellectual property rights they own or control in a game. All of the elements of a videogame ' the story, audiovisual elements, underlying computer code and even 'gameplay' elements (ie, that specify the way a user interacts with and experiences a game) ' are subject to one or more forms of intellectual property protection. Traditionally, intellectual property protection for videogames has been based upon either trade secret, copyright or trademark. Patents, however, are quickly becoming an important part of the videogame industry.
Cameo Clips
September 28, 2006
BANKRUPTCY PRIORITIES/PAYMENTS TO MUSICIANS<br>BANKRUPTCY/COPYRIGHT STATUTORY DAMAGES<br>COPYRIGHT OWNERSHIP/DERIVATIVE WORKS<br>MUSICAL COMPOSITIONS/PUBLIC PERFORMANCE<br>
<b>Decision of Note: </b>Burden on Plaintiff for Contingent Fees
September 28, 2006
The Court of Appeal of California, Second District, Division Five, found that the trial court didn't err in refusing to shift the burden of proof to defendant NBC Studios in a suit for contingent compensation by the executive producers of the TV series 'The Profiler.' <i>Sanders/Moses Productions Inc. v. NBC Studios Inc.</i>
<b><i>Case Study</b></i> Infringement Suit over Rap Song Offers Useful Tips for Litigators
September 28, 2006
Copyright-infringement suits in which plaintiff accuses defendant of improperly taking from the plaintiff to create the defendant's work are common in the entertainment industry. But even with the frequency and long history of this type of litigation, infringement principles continue to develop as litigators face many substantive and procedural challenges. In the following interview, conducted by Entertainment Law &amp; Finance Editor-in-Chief Stan Soocher, veteran entertainment-litigator Christine Lepera ' a partner in the New York office of Sonnenschein Nath &amp; Rosenthal LLP ' discusses infringement litigation issues from her perspective as defense counsel in the copyright suit that was filed in the U.S. District Court for the Southern District of New York against rappers Ludacris and Kanye West and related companies. <i>BMS Entertainment/Heat Music LLC v. Bridges</i>.
Managing Electronic Evidence
September 28, 2006
Discovery demands on in-house legal staff have changed drastically in recent years. Historically, complying with subpoenas and document production requests were quotidian chores for in-house legal staff. After receiving a complaint, counsel's office issued a standard 'document hold' to affected employees and directed that those involved in the case preserve their files and not destroy anything. Questions might arise, but they were manageable. What must be disclosed? What documents are privileged? How long will it take to retrieve documents from storage? How many staff hours will complying require? How much will it cost? Who bears the cost? Which discovery requests should be challenged?
Online Legal Matching
September 28, 2006
In the relatively newfangled sector of e-commerce, how often does an entrepreneur or attorney who represents e-commerce clients get to witness the birth of a new industry? <br>Well, there's a new player in the $173 billion legal services industry, and its initials are OLM ' a euphonic moniker for online legal matching.
Blackmail and the CEO
September 27, 2006
You got up yesterday morning and went to the front door of your house to take in the morning newspaper. That's when you saw it. A sealed manila envelope with your name typed on the label. You figured that it must be work-related, so you opened it. When you did, what you saw made your heart jump. Inside was a plain piece of paper with these typed words: <i>'I Know What You Are Doing. Shame On You. Stop The Cheating And The Lies Or I Will Tell The World. You Will Be Disgraced. How Could You Hurt So Many People?'</i>
<b>Online Exclusive:</b> FTC Shuts Down Four Spamming Operations
September 18, 2006
The Federal Trade Commission ('FTC') announced that it settled litigation against four spam operators, resulting in their permanent shutdown. Each operator was charged with sending spam that violated provisions of the CAN-SPAM Act, and one was also charged with violating the Adult Labeling Rule that requires that senders use the phrase 'SEXUALLY EXPLICIT' in the subject line of sexually explicit e-mail.
Counsel Concerns
September 01, 2006
Malpractice Claims and Estoppel.
Bit Parts
September 01, 2006
<i>By Stan Soocher</i>Estate Planning/Undue Influence ClaimTV-Series Sequels/<i>Forum NonConveniens</i>Upcoming Events

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Inferring Dishonesty: The Fifth Amendment and Fidelity Coverage
    Dishonest employees always have posed a problem for businesses. The average business may lose 6% of its annual revenues to employee fraud, and cumulatively the impact of employee theft on the economy is estimated to be $600 billion annually. <i>See</i> Association of Certified Fraud Examiners ("ACFE"), 2002 Report to the Nation on Occupational Fraud &amp; Abuse, at ii, 4 (2002), available at <i>www.cfenet.com/publications/rttn.asp.</i> Although the average loss through employee embezzlement is $25,000, where computerized financial records or transactions are involved, the average loss increases nearly twentyfold. <i>See</i> National White Collar Crime Center, <i>WCC Issue: Embezzlement/Employee Theft,</i> at 2 (2002), available at <i>http://nw3c.org/downloads/Computer_Crime_Weapon.pdf.</i>
    Read More ›