Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


Using Computer Forensics to Investigate Employee Data Theft
May 02, 2017
Departing employees have a sense of ownership over the data that they copy. Intellectual property commonly stolen includes customer lists, secret formulas, source code, strategy documents and other trade secrets. The information is often used against the organization when the former employee goes to work for a competitor or decides to start a new company.
A Look at Right of Publicity Suit Over <i>Gears of War</i>
May 02, 2017
Celebrities who are fiercely protective of their image and branding fight back, bringing an increasing number of lawsuits when it appears that a video game creator has borrowed without permission. These right of publicity cases highlight the tension that exists between the rights of public figures to control the way their image and likeness is used in commercial contexts and the First Amendment.
The Challenge of Complying with China's New Cybersecurity Law
May 02, 2017
In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. The law is set to go into effect June 1, 2017. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.
The Challenge of Complying with China's New Cybersecurity Law
May 02, 2017
In a bid to assert control over cyberspace, China passed a sweeping cybersecurity law that affects virtually every company doing business in that country. The law is set to go into effect June 1, 2017. Despite its broad reach and potential for disruption, it appears that very few legal professionals are aware of the law.
Sixth Circuit Trims Bank's Good-Faith Defense to Fraudulent Transfer Claims
May 02, 2017
<b><I>Part One of a Two-Part Article</I></b><p>The issue of what constitutes a good-faith defense to a fraudulent transfer claim is a murky question that has produced a wide variety of reported decisions from appellate courts over the years. But a recent Sixth Circuit opinion sheds some clear light on a complicated fact pattern.
<b><i>Daubert</i></b> Motions Really Do Work
May 02, 2017
<b><I>Part Two of a Three-Part Article</I></b><p>The starting point for any successful challenge under Federal Rules of Evidence (FRE) 702 and <I>Daubert</I> is the form and content of the witness's disclosure under Federal Rules of Civil Procedure (FRCP) 26(a)(2). Here is all you have to know.
Beware: Inspecting Goods May Waive Implied Warranty Protections
May 02, 2017
When purchasing goods though an invoice, contract or otherwise, it is important to understand that a mere inspection of goods prior to purchase could waive implied warranty protections. A seller may effectively modify, or entirely exclude, implied warranties under the Uniform Commercial Code (UCC) by requiring a buyer to inspect, test or examine goods prior to purchase.
Looking to Expand Into Mass Torts?
May 02, 2017
Mass torts are a strong way for trial lawyers to check Big Pharma's unfettered safety violations. However, it is not a practice area without dangers; and like so many other dangers, they are often hidden.
When Actions Speak Louder Than Words
May 02, 2017
<b><I>Written Agreements Are Not the Final Word</I></b><p>Recently, an Ohio appellate court held that the parties' actual conduct — and not the express written provisions in their lease to the contrary — controlled in interpreting the intentions of the parties in contracting. This case serves as a good reminder for legal practitioners that our written agreements are often not the final word.
Can Instagram Post of Photo Become Transformative?
May 02, 2017
An enlarged print of an Instagram post containing a copyrighted photo counts as a transformative use, an attorney for "appropriation artist" Richard Prince — whose use of other artists' material in his own works has made him no stranger to the courts — argued before a New York federal judge in April.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›