Features
Law Firms and Social Networking
Along with the viral popularity of social networking Web sites (one of these sites is the fourth most-trafficked Web site in the world), legal blogs, collaboration sites, and informal online education options comes the vulnerability of some risk.
Features
Franchise Companies vs. Hackers: Twenty Questions on Cybercrime
The 21st century is clearly the age of cybercrime, and franchise companies should be especially concerned because, simplistically, there are only two types of computer systems: those that have been hacked, and those that will be hacked.
Features
Technology Puts a Dream House on Hold
A look at <i>A.E., Inc. v. Goodyear Tire and Rubber Co., Inc.</i>, No. 05-CV-01317 (D. Colo. 2007), in which visual technology paid a major part in the trail.
Features
The Golden Rule of Biological Inventions And the Written Description Requirement
In an ideal world, a business would have a patent practitioner everywhere at once: in the lab, in the office, and in the boardroom. The purpose of this article is to interpret a sphere of patent law related to the description of biological inventions in terms that are practical for researchers and business managers in the biotech industry who live in a non-ideal world.
Features
Curbing Internet Defamation
An identifiable Internet speaker who sends an unlawful e-mail or posts an unlawful Internet message is subject to traditional litigation tactics. However, countless Internet speakers are not effortlessly identifiable. Hence, novel technical, administrative law and litigation tactics are advantageous for successfully curbing Internet defamation.
Features
What's in a Domain Name? The Changing Internet
Generic, top-level domain names (gTLDs), such as .com or .net, are the sorters of the Internet. They serve the single purpose of identifying the database in which a domain name is registered. Last June, ICANN reversed its long-held position and announced that it would allow an unlimited number of generic top-level domains.
Features
Online Anti-Porn Law Dies at Supreme Court
A federal law intended to restrict children's access to Internet pornography died quietly last month at the U.S. Supreme Court, more than 10 years after Congress overwhelmingly approved it. The Supreme Court rejected U.S. government prosecutors' last-ditch defense of COPA without comment, meaning that the law will not be enforced.
Features
RIAA Tempers Tactics
In December, the RIAA announced that it would no longer look to file suit against individual file sharers and instead form relationships with ISPs that maintain the online accounts of the consumers.
Features
Listen Up: What the Discoverability of Audio Recordings Should Mean to IT Professionals
The necessity for IT professionals to haul audio recordings into their general e-discovery process is gaining awareness because of situations that may ' at first glance ' appear harmless.
Features
Empower Your Browser: New Possibilities
The Web browser has evolved into a platform for our digital lives, offering more interactivity while moving further beyond its passive browsing roots (i.e., checking e-mail, paying bills and balancing checkbooks, watching videos, social networking, playing games, networking and even managing a law practice). That is precisely the core of Google's new Web browser called Chrome.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Protecting Innovation in the Cyber World from Patent TrollsWith trillions of dollars to keep watch over, the last thing we need is the distraction of costly litigation brought on by patent assertion entities (PAEs or "patent trolls"), companies that don't make any products but instead seek royalties by asserting their patents against those who do make products.Read More ›
- Risks of “Baseball Arbitration” in Resolving Real Estate Disputes“Baseball arbitration” refers to the process used in Major League Baseball in which if an eligible player's representative and the club ownership cannot reach a compensation agreement through negotiation, each party enters a final submission and during a formal hearing each side — player and management — presents its case and then the designated panel of arbitrators chooses one of the salary bids with no other result being allowed. This method has become increasingly popular even beyond the sport of baseball.Read More ›
- Private Equity Valuation: A Significant DecisionInsiders (and others) in the private equity business are accustomed to seeing a good deal of discussion ' academic and trade ' on the question of the appropriate methods of valuing private equity positions and securities which are otherwise illiquid. An interesting recent decision in the Southern District has been brought to our attention. The case is <i>In Re Allied Capital Corp.</i>, CCH Fed. SEC L. Rep. 92411 (US DC, S.D.N.Y., Apr. 25, 2003). Judge Lynch's decision is well written, the Judge reviewing a motion to dismiss by a business development company, Allied Capital, against a strike suit claiming that Allied's method of valuing its portfolio failed adequately to account for i) conditions at the companies themselves and ii) market conditions. The complaint appears to be, as is often the case, slap dash, content to point out that Allied revalued some of its positions, marking them down for a variety of reasons, and the stock price went down - all this, in the view of plaintiff's counsel, amounting to violations of Rule 10b-5.Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- The DOJ Goes Phishing: The Rise of False Claims Act Cybersecurity LitigationWhile the DOJ Civil Cyber-Fraud Initiative is still in its early stages and cybersecurity regulations are evolving, whistleblower plaintiffs have already begun leveraging the FCA to pursue alleged noncompliance with government cybersecurity requirements.Read More ›