Obtaining Rights to Artists and Content For Use in Music-Driven TV Productions
October 30, 2006
The producers of music-driven television programs, such as variety specials and music-based TV series, typically must negotiate with several key parties to obtain the rights to use the music and the services of the artists in the show. These parties include: music publishers that own, control and/or administrate the music compositions performed 'live and in concert' and/or on sound-recording masters included in the program; the record labels that own, control and/or administrate the masters; and the labels that are entitled to the exclusive recording services of the artists performing the music in the TV show. The program producer, who will likely have created the concept and format for the TV production, usually undertakes all of the production's associated risks and is responsible for the program's financing.<br>In the following interview coordinated by Entertainment Law & Finance Editor-in-Chief, Stan Soocher, Santa Monica, CA-based entertainment-attorney Henry Root discusses key aspects of the clearance process involved in music-driven TV productions, as well as producer/label negotiations and how they may affect the artist. Root has over 25 years of experience in the music and TV industries.
On the Case
October 30, 2006
In the legal realm, concern about the security of sensitive data during transport has never been higher. Attorneys from coast to coast have watched the headlines and read countless articles about files and tapes that have been lost or stolen while being moved from Point A to Point B ' during legal discovery activities, perhaps, or to satisfy compliance requirements.<br>As a result, law firms and corporate in-house counsel are investigating more dependable methods for securing information during transit, when it is most vulnerable. Many of these experienced denizens of e-data have concluded that encryption provides the greatest protection throughout the chain of custody, and that this locked-door method of data security can be achieved at a relatively reasonable cost.
Prepare for e-Discovery
October 30, 2006
With state laws governing the capture and securing of evidence ' including electronic data ' the possibility of spoliation is a genuine concern. Not only could evidence subjected to spoliation be inadmissible, but misdemeanor or felony charges could apply to the collector and the contracting party.<br>Identifying electronic evidence, much like in a physical crime scene, starts with drawing increasing concentric circles around the victim or perpetrator. Some care must be taken regarding a company's policies and practices. State and federal law on personal property may be involved if the employee used personal devices legally or illegally in combination with the company's assets, and a warrant or commencement of discovery may be required to access personal property or equipment on private property.
Blogging and the Workplace
October 30, 2006
Blogs can reach millions of readers long before the employer learns about a potentially worrisome posting. No laws specifically regulate blogging per se, and there's virtually no guiding case law. And so, employers must look elsewhere for guidance on balancing employees' interest in life away from work and ensuring that employees' blogging doesn't damage business interests; that elsewhere is a new destination on the company document roster: a blogging policy.
'No Sublicense' Rule Extended to Trademark and Publicity Rights: The Half-Century Saga of Miller v. Glenn Miller Productions, Inc.
October 30, 2006
It is well settled that a patent or copyright licensee may not sublicense that right absent specific authorization. <i>See, eg, Gardner v. Nike, Inc.</i> 279 F.3d 774 (9th Cir. 2004); <i>Unarco Industries, Inc. v. Kelley Co.</i>, 465 F.2d 1303 (7th Cir. 1972); <i>In re Patient Education Media, Inc,</i> 210 B.R. 237 (S.D.N.Y 1997). Trademarks are often grouped with patents and copyrights as 'intellectual property,' but fundamental differences among the genres exist. <i>See, eg, Sony Corp of America v. University City Studios</i>, 464 U.S. 417, 439 n.17 (1984). Do the same policies supporting the so-called 'no sublicense' rule in the patent and copyright context apply to trademarks and related publicity rights?
e-Mail Job Termination Notices
October 30, 2006
Traditionally, job-termination notices took the form of a pink slip of paper that employees found in their mailbox or in the envelope carrying their paycheck.<br>Recently, however, tech retailer Radio Shack used e-mails to give more than 400 employees notice of their involuntary separation from the firm. That move probably wasn't the use of technology many in the e-commerce, or the bricks-and-mortar, world envisioned for the business sector.
News Briefs
October 30, 2006
Highlights of the latest franchising news from around the country.
Competitive Intelligence: A Tool for In-house Counsel
October 30, 2006
Competitive Intelligence has long been used by corporate America to analyze trends, client feedback, and marketing strategies to get an edge. It's the newest buzzword among law firms to win more market share and retain clients. But it's barely a whisper in law departments, at least when it comes to selecting outside counsel.
The Human Side of Data Security
October 30, 2006
As headlines continue to report data security breaches at an alarming rate, discussion often focuses on the need for enhanced technical controls, such as two-factor authentication and encryption, to protect sensitive, personally identifiable information. The role of the company employee, both as the cause of, and the first line of defense against, security breaches is often lost in the analysis. Yet developing law is increasingly requiring administrative or procedural controls, particularly those directed at employees, as a component of a legally compliant security program.