Features
Don't Get Caught with Your Patents Down
Reverse engineering of competitor products has always played a large and important role in any successful assertive patent licensing program. However, new developments in the patent licensing arena are making reverse engineering much more vital and often necessary for any company seeking to capitalize on its intellectual property assets.
Features
e-Commerce Docket Sheet
Recent cases in e-commerce law and in the e-commerce industry.
Features
Cyberinsurance for Data Security Risks
The harms that can result from computer security breaches are largely uncovered by the types of insurance policies most law firms maintain, and that makes those firms subject to unnecessary risk for theft of client data. Combined with the inadequate security most law firms provide for client data anyway, the resulting exposure risk may well violate legal professional ethics.
Features
Turbo-Charge Your Table of Authorities
Does anyone in your firm still use ledger sheets and a calculator for computations rather than set up a spreadsheet? Absolutely not! Does anyone in your firm create footnotes manually instead of using the 'Insert Footnote' feature in your word processing program or, worse, hand redline a document? Never! Using these old methods despite software that is taken for granted today seems, well, inconceivable. However, if your litigation attorneys and secretaries are not using productivity-enhancing software to prepare their tables of authorities ('TOAs'), they are missing out on a major opportunity to streamline their production of briefs.
Features
Maximizing the Power of Virtual Data Rooms
Virtual data rooms ('VDRs') offer legal and financial professionals an array of advantages. Overall, VDRs make it possible for lawyers and other deal advisers to focus more on the substantive work to be done and less on procedural aspects of deal management.
Features
e-Telephone Privacy
At low cost and widening availability, VoIP is common in business, and might be used at a greater volume and frequency among tech and e-commerce companies, thus making it a technology and a commodity to watch. Unfortunately, for consumer and businessperson alike, a concealed cost of VoIP service might be a user's privacy. That's because traditional telephone privacy is strictly sheltered by existing case law and statute, while VoIP, it could be argued, is unprotected in many instances.
Features
Safe-Harbor Considerations For Web Videos
From YouTube's perspective, taking burdensome steps to prevent the posting of potentially infringing content could destroy the business model and consumer goodwill upon which it relies. [Although YouTube recently announced it was tesing a new copyright filtering process.] This information sharing/rights protection dilemma is not solely limited to YouTube ' many Web sites and other service providers face decisions every day concerning the propriety of user-generated content. The U.S. Copyright Act may provide a critical solution to that dilemma.
Features
Navigating the Potential Traps in Licensing Content for Online Uses
Copyright owners who are considering licensing their content for online exploitations must understand that they are venturing into still largely uncharted waters with few reliable partners. It's better than it was in 2000 ' or even 2003 ' but it's still not an entirely stable environment with dangerous shoals along the route. Don't assume that words you have seen in contracts for decades have the same meaning to your online licensee as they would to a court.
Features
e-Commerce Docket Sheet
Recent cases in e-commerce law and in the e-commerce industry.
Features
Dealing with the Surprise Government Interview
When conducting criminal investigations about possible corporate wrongdoing, in alleged defective-products matters and other cases, government agents often seek to interview company executives and other employees ' of old-line bricks-and-mortar and e-commerce companies ' 'by ambush' outside the office, to minimize the likelihood that a supervisor or a company lawyer might intervene to thwart the interview. There is nothing improper in using this investigative technique; nevertheless, employees should know their legal rights and understand the risks they take when they submit to such surprise interrogations.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Why So Many Great Lawyers Stink at Business Development and What Law Firms Are Doing About ItWhy is it that those who are best skilled at advocating for others are ill-equipped at advocating for their own skills and what to do about it?Read More ›
- The DOJ's Corporate Enforcement Policy: One Year LaterThe DOJ's Criminal Division issued three declinations since the issuance of the revised CEP a year ago. Review of these cases gives insight into DOJ's implementation of the new policy in practice.Read More ›
- 'Insurable Interest' and the Scope of First-Party CoverageThis article reviews the fundamental underpinnings of the concept of insurable interest, and certain recent cases that have grappled with the scope of insurable interest and have articulated a more meaningful application of the concept to claims under first-party property policies.Read More ›
- Blockchain Domains: New Developments for Brand OwnersBlockchain domain names offer decentralized alternatives to traditional DNS-based domain names, promising enhanced security, privacy and censorship resistance. However, these benefits come with significant challenges, particularly for brand owners seeking to protect their trademarks in these new digital spaces.Read More ›
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›