Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Search


<b><i>Online Extra</b></i>FCC Approves Net Neutrality Proposal
February 27, 2015
By a 3-to-2 vote, the Federal Communications Commission on Feb. 26 approved a significant change in rules to promote 'net neutrality.'
Upcoming Event
February 27, 2015
SXSW Music Conference 2015 CLE Program. Austin, TX, March 20-21
Case Notes
February 25, 2015
Analysis of a case involving the SEC.
Case Notes
February 25, 2015
PIP Grace Period Doesn't Automatically Save Late Claim An insurance coverage claimant's apparent failure to transmit medical records in a timely fashion ' without a showing that it was impractical to do so ' has resulted in the dismissal on summary judgment of his complaint that benefits were improperly withheld under Delaware's personal injury protection statute, a New Castle County Superior Court judge has ruled. '
<b><i>Online Extra</b></i>$2.5M Verdict Awarded in First Phila. Risperdal Trial
February 24, 2015
A Philadelphia jury on Feb. 24 awarded $2.5 million to the plaintiff in the first of roughly 1,250 Risperdal mass-tort cases in the city's courts.
<b><i>Online Extra</b></i> FTC Stakes Claim As Data Security Cop
February 02, 2015
On the heels of an appellate win, the Federal Trade Commission on Jan. 23 reiterated its power to hold companies liable for data security breaches.
<b><i>Online Extra</b></i> Turning Cybersecurity Into a Serious 'Game of Threats'
February 02, 2015
The last few years have seen some creative new methods of getting businesses engaged in protecting their networks and data. PricewaterhouseCoopers has created a cybersecurity computer game. PwC's 'Game of Threats' walks businesspeople, playing either as a team of nefarious hackers or as a company being attacked, through the important decisions they have to make during a breach, in hopes of giving them a deeper knowledge of cybersecurity and its challenges.
<b><i>Online Extra</b></i> FTC Report on 'Internet of Things' Triggers Strong Dissent
February 02, 2015
Recommending specific steps to enhance consumer privacy and data security, the Federal Trade Commission on Jan. 27 issued a report on the 'Internet of Things'' billions of devices that include everything from fitness monitoring bracelets to home security systems.
Trademark Licensees May Be Able to Have Their (Cup)Cake and Eat It, Too
January 31, 2015
Following a recent line of high-profile and notable decisions that have sought to protect the rights of trademark licensees in a trademark licensor's bankruptcy, the United States Bankruptcy Court for the District of New Jersey has issued a significant decision that, for the first time, extends the protections of Section 365(n) of the Bankruptcy Code, 11 U.S.C. ' 365(n), to trademark licensees on equitable grounds.
The Implied Covenant of Good Faith and Fair Dealing Under U.S. Law
January 31, 2015
When circumstances change, parties to an agreement often find that the agreement does not cover the exact situation they are now facing. Instead, depending on how their contract is interpreted, one of the parties may be able to take advantage of the contractual silence or ambiguity and act in a way that causes detriment to the other.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • The Stranger to the Deed Rule
    In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.
    Read More ›