Features
Internet Memes and Intellectual Property Risks
Internet memes ' those attention-getting images, videos, and catchy phrases that whip across the Internet via e-mail and social media ' have long been a part of online culture. But while a corporate strategy of exploiting memes can be highly entertaining and can capture consumers' attention, using these online assets can be risky if intellectual property rights are infringed in their dissemination.
Features
Social Media and the National Labor Relations Act
We offer below a set of frequently asked questions with answers distilling the key points that U.S. employers should understand about this new area of NLRA enforcement activity. These FAQs are accompanied by practical suggestions that technology counsel can use to help employers navigate these issues in drafting and updating their own social media policies.
Features
Websites Aren't Built in a Day
Redoing your firm's website is a collaborative process with specific steps that you should try to follow. The purpose of this three-part article is to review each of those steps so that law firm professionals have a better understanding of website design and development in order to better manage internal expectations when they undertake a website redesign project.
Features
Standard Law Firm Operating Procedures: Optional or Critical?
Without Standard Operating Procedures, law firms suffer from inconsistency, chaos and lack of control. Having SOPs is a must for legal IT departments. From lost equipment to lost passwords and data, not having written policies and procedures can create liability and losses that are sometimes unrecoverable.
Features
Protect Your Firm!
Bring-Your-Own-Device (BYOD) programs, which allow employees to use their personally owned smartphones, tablets and laptops in and out of the work environment, are significantly changing information technology (IT). Law firms around the country are embracing BYOD as it lets executives and employees use the mobile devices, service providers and operating platforms of their choice.
Features
Analysis of Appeals Courts' Views on File Sharer Damages
In 2012, the U.S. Court of Appeals for the Eighth Circuit issued what was only the second federal appellate ruling on statutory damages against an infringing file sharer. The Eighth Circuit reinstated statutory damages of more than $220,000 against a woman who illegally file-shared two dozen songs, finding the damages to be constitutional.
Features
Factors in Assessing Statutory Damages for Digital Copyright Infringement
A recent federal district court award of $6.6 million in statutory damages to music publishers for the unlicensed use of song lyrics by the website LiveUniverse and its operator was hailed as the first of its type for owners of song lyrics, and thus a significant milestone for content owners in the digital era.
Features
When Discovery Clashes with Privacy Law
Businesses that want to use data analytics and comply with privacy rules have an additional burden when the data in question become or could become part of discoverable information in litigation. Then, businesses must make choices about how to handle PII data, which of it to produce and the justifications to support those decisions. Balancing these data-driven issues requires an understanding of the ever evolving landscape of each competing concern.
Features
Insurance Coverage for Data Breach Claims
This article examines insurance coverage for data breaches. Counsel may be surprised to learn that coverage for data breaches is not limited to specialty policies, and can often be found under standard CGL or property insurance policies. Any time a potential data breach occurs, it is essential for an insured to consider all forms of insurance that it carries and to provide prompt notice to its insurer(s) of any policy that even potentially could apply.
Features
Protecting Weak Online Trademarks
Creating a brand name that is trademark-worthy and can be defended in the market requires a thoughtful strategy. The standards of the USPTO for trademark registration are nuanced, and the wrong choice of words can make it challenging to obtain a defensible registered mark.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- Private Equity Valuation: A Significant DecisionInsiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity LitigationWhile the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.Read More ›
- What Does 2024 Hold for Cybersecurity?Our annual poll of experts on the trends and developments to watch out for in 2024 in AI, data privacy, cybersecurity, e-discovery and more.Read More ›