Account

Sign in to access your account and subscription

Technology Media and Telecom

  • Reverse engineering of competitor products has always played a large and important role in any successful assertive patent licensing program. However, new developments in the patent licensing arena are making reverse engineering much more vital and often necessary for any company seeking to capitalize on its intellectual property assets.

    November 29, 2007Terry Ludlow
  • Recent cases in e-commerce law and in the e-commerce industry.

    November 26, 2007Julian S. Millstein, Edward A. Pisacreta and Jeffrey D. Neuburger
  • The harms that can result from computer security breaches are largely uncovered by the types of insurance policies most law firms maintain, and that makes those firms subject to unnecessary risk for theft of client data. Combined with the inadequate security most law firms provide for client data anyway, the resulting exposure risk may well violate legal professional ethics.

    November 26, 2007Ed Poll
  • Does anyone in your firm still use ledger sheets and a calculator for computations rather than set up a spreadsheet? Absolutely not! Does anyone in your firm create footnotes manually instead of using the 'Insert Footnote' feature in your word processing program or, worse, hand redline a document? Never! Using these old methods despite software that is taken for granted today seems, well, inconceivable. However, if your litigation attorneys and secretaries are not using productivity-enhancing software to prepare their tables of authorities ('TOAs'), they are missing out on a major opportunity to streamline their production of briefs.

    November 26, 2007Tracey Baetzel
  • Virtual data rooms ('VDRs') offer legal and financial professionals an array of advantages. Overall, VDRs make it possible for lawyers and other deal advisers to focus more on the substantive work to be done and less on procedural aspects of deal management.

    November 26, 2007Joel Ginsberg
  • At low cost and widening availability, VoIP is common in business, and might be used at a greater volume and frequency among tech and e-commerce companies, thus making it a technology and a commodity to watch. Unfortunately, for consumer and businessperson alike, a concealed cost of VoIP service might be a user's privacy. That's because traditional telephone privacy is strictly sheltered by existing case law and statute, while VoIP, it could be argued, is unprotected in many instances.

    November 26, 2007Jonathan Bick
  • From YouTube's perspective, taking burdensome steps to prevent the posting of potentially infringing content could destroy the business model and consumer goodwill upon which it relies. [Although YouTube recently announced it was tesing a new copyright filtering process.] This information sharing/rights protection dilemma is not solely limited to YouTube ' many Web sites and other service providers face decisions every day concerning the propriety of user-generated content. The U.S. Copyright Act may provide a critical solution to that dilemma.

    October 29, 2007Jakob Halpern
  • Copyright owners who are considering licensing their content for online exploitations must understand that they are venturing into still largely uncharted waters with few reliable partners. It's better than it was in 2000 ' or even 2003 ' but it's still not an entirely stable environment with dangerous shoals along the route. Don't assume that words you have seen in contracts for decades have the same meaning to your online licensee as they would to a court.

    October 29, 2007Christian L. Castle
  • Recent cases in e-commerce law and in the e-commerce industry.

    October 29, 2007ALM Staff | Law Journal Newsletters |
  • When conducting criminal investigations about possible corporate wrongdoing, in alleged defective-products matters and other cases, government agents often seek to interview company executives and other employees ' of old-line bricks-and-mortar and e-commerce companies ' 'by ambush' outside the office, to minimize the likelihood that a supervisor or a company lawyer might intervene to thwart the interview. There is nothing improper in using this investigative technique; nevertheless, employees should know their legal rights and understand the risks they take when they submit to such surprise interrogations.

    October 29, 2007David M. Rosenfield and James A. Moss