Features
Analysis of Decision By Supreme Court on Video Games
Supreme Court Justice Antonin Scalia and his teammates recently mowed down California's ban on violent video games with fully loaded First Amendment precedents and barbed retorts to opposing arguments. In doing so, the U.S. Supreme Court reinforced a fundamental point: First Amendment protections do not depend on the medium of communication. Thus, video games are protected speech, and restrictions based on their content will be subject to strict scrutiny.
Features
Understanding and Mitigating the Legal Risks of Cloud Computing
Information governance policies and procedures can be developed to reduce the risks and realize the benefits of cloud computing.
Features
Protecting IP Rights in a New gTLD World
The International Corporation for Assigned Names and Numbers, the international body governing Internet naming and addressing practices, approved in June a plan that allows for a virtually unlimited number of new generic top-level domains (new gTLDs), including new non-English, character-set international domain names. Companies concerned with protecting intellectual property rights have two ways to address the issue — to the right of the dot and to the left of the dot.
Features
Technology in Marketing: Boosting Your Twitter Ratio (What's That?)
As explained on twitterratio.com, the Twitter ratio is calculated by dividing the number of your followers by the number of your "friends." Here's what it means.
Features
Understanding and Mitigating the Legal Risks of Cloud Computing
There can be significant economic efficiencies realized by moving to the cloud. However there are also potential risks involved if an entity does not adequately consider the information governance implications, especially those involving electronic discovery.
Features
Waging Trademark War Against 'i-Pirates'
Trademark infringers have preyed on the fertile software marketplaces opened by companies like Apple and Google by offering apps for download under names that are identical or confusingly similar to other well-known brand names. These online trademark bandits are effectively engaging in a form of "i-piracy," whereby they attempt to profit from the goodwill associated with established trademarks by pirating those marks for use in their own knock-off apps.
Features
Internet Crime and the Elderly
The same technology that provides the means for customers in various market sectors to truly interact with merchants also allows a similar force multiplication for Internet criminals, including charlatans and other rogues who prey on some of the most vulnerable among us ' the elderly.
Features
Reining in the Inequitable Conduct Defense
Responding to views from the U.S. Patent and Trademark Office and elsewhere about the unintended consequences of the current inequitable conduct doctrine, a divided <i>en banc</i> Federal Circuit decision issued on May 25, 2011 adjusted the standard of the materiality element to make this defense harder to establish.
Features
The Benefits of a Next Generation Database Platform
Data processing tools have evolved and are now well suited for use in law firms to prepare electronic data for use with these Web applications. Law firms that implement these new applications are well positioned to significantly improve efficiency, better serve their clients and dramatically reduce costs.
Features
Integration In the Cloud
One of the greatest challenges any organization can face is the integration of evolving technology into its culture, practice and processes. At Bradford & Barthel ("B&B"), our main challenges in this regard have focused on the adaptation of Google Apps within our environment and business model.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Enhanced Oversight of Search Warrants and Title III WiretapsSearch warrants and wiretaps were once used primarily to investigate organized crime, drug dealing and terrorism. In recent years, however, prosecutors have employed these tools increasingly in the context of white-collar crime to the point where it is now commonplace.Read More ›
- Bankruptcy Sales: Finding a Diamond In the RoughThere is no efficient market for the sale of bankruptcy assets. Inefficient markets yield a transactional drag, potentially dampening the ability of debtors and trustees to maximize value for creditors. This article identifies ways in which investors may more easily discover bankruptcy asset sales.Read More ›
- Use of Deferred Prosecution Agreements In White Collar InvestigationsThis article discusses the practical and policy reasons for the use of DPAs and NPAs in white-collar criminal investigations, and considers the NDAA's new reporting provision and its relationship with other efforts to enhance transparency in DOJ decision-making.Read More ›
- The Right to Associate in the DefenseThe "right to associate" permits the insurer to work with the insured to investigate, defend, or settle a claim. Such partnerships protect the insurer and can prove beneficial to the insured's underlying case and ultimate exposure.Read More ›
- DOJ's Cyber Fraud Initiative: A Wake-up Call That Keeps RingingDOJ's Cyber Fraud Initiative has been a wake-up call for companies to prioritize cybersecurity and adhere to stringent standards. By leveraging the FCA, DOJ has used a powerful enforcement tool to target a wide range of cybersecurity failures and misrepresentations. The increasing focus on cybersecurity by enforcement agencies means that robust cybersecurity practices are becoming a standard expectation, not just a best practice.Read More ›