Electronic Chattel Paper
October 02, 2015
One of the significant benefits bestowed upon chattel paper financers is the ability to perfect a security interest via possession, and in so doing potentially achieve priority over pre-existing secured lenders who perfected by filing a UCC Financing Statement. Now, the system is moving toward electronic chattel paper. What does this mean?
<b><i>Online Extra:</b></i> U.S. and UK Corporations Sustain High Levels of Digital Vulnerabilities
October 01, 2015
If there is any major concern corporations bear this year having watched last year's round of large-scale, invasive, expensive data hacks, it is the one of cyber security. In 2015, Centrify ' an identity management company ' surveyed more than 400 IT decision makers in the U.S. and UK to grasp the scope of how secure they believe they are and should be. The group asked: How much are hackers costing organizations that don't make the front page like Sony?
Telemedicine: Best Practices to Avoid Liability
September 02, 2015
Telemedicine is rapidly evolving, and with its evolution comes new potential pitfalls and risks. Practitioners in this area should keep abreast of state laws and regulations regarding telemedicine, as well as keep an eye out for developments in the federal landscape.
New Report Offers Statistics On Copyright Cases
September 02, 2015
Lex Machina, a legal analytics company that grew out of a project run by Stanford University's law school and its computer science department, has published a 37-page "copyright litigation report" developed from litigation data and court decisions covering thousands of copyright cases filed in U.S. district courts over the past five years. The report analyzes key filings, findings, judgment types, decisions, resolutions, damages and other data.
Social Media Policies For Employees in the Educational Setting
September 02, 2015
As a new school year begins, the use of social media is more prevalent in the classroom than ever. And while many school districts have adopted social media policies relating to the regulation of its students' actions, many have not implemented similar policies with respect to its employees, including teachers and other staff.
Ashley Madison Data Breach Sparks Suits
September 02, 2015
Infidelity website AshleyMadison.com and its parent company Avid Life Media Inc. have been hit with a pair of class actions in Los Angeles federal court stemming from the site's recent data breach.
Searches Without Frontiers
September 02, 2015
The first half of 2015 has seen vigorous debate over U.S. law enforcement's authority to seize data evidence stored overseas. MLATs are agreements between two or more countries that facilitate cross-governmental collaboration in criminal investigations and prosecutions. But the MLAT process is complicated, time-consuming and ill-equipped to handle 21st-century data storage and privacy issues.
Archiving's Role Within e-Discovery 2.0 and What's Expected for the Future
September 02, 2015
When responding to e-discovery events such as audits or potential litigation, the cost of persisting with older, traditional methods for key parts of the process can nearly bankrupt a company. Modern archiving technologies that consolidate and proactively store content in a single "search-ready" repository are now playing a crucial role within next generation 2.0 e-discovery processes.
'Customary Operations' or a Vacant Building?
September 02, 2015
Many times, courts are faced with the question of whether a loss location is "vacant" under a commercial property policy when trying to determine if the building owner or lessee is conducting customary operations. This article explores various decisions across the United States addressing what is considered "customary operations," thereby rendering the property "vacant.