Features
Combating Counterfeiting
Online counterfeit sellers are increasingly more sophisticated and are engaging in social media counterfeiting to exploit social media tools to bolster their sales of counterfeit products online.
Features
Cariou, Viacom Copyright Suits Settlements
March 2014 turned out to be a big month for copyright litigation settlements. They all came without warning, but two seemed to make a lot of sense.
Features
Supreme Court Grants <i>Cert</i> in <i>Aereo</i> Case
<i>Aereo</i>may turn out to be one of the most important copyright decisions since enactment of the Copyright Act of 1976, with potential wide-ranging ramifications for the television industry and the fast-growing cloud computing industry.
Features
Privacy and Ethics For Social Media In Investigations
It begins with a name ' perhaps an employee alleged to have been involved in misconduct or a suspected whistleblower. Regardless of the origin of identity, if the person is relevant to a company's internal investigation, whatever information that can be provided is power for the company, the power to make informed decisions.
Features
Statistical Sampling
The focus on proportionality in high-profile cases such as <i>Apple v. Samsung</i>, coupled with the recent proposed amendments to the Federal Rules of Civil Procedure are driving attorneys to reevaluate the methods by which they uncover crucial electronic evidence for a case.
Features
Collaborating in The Cloud
One of the great advantages of working with files in a cloud drive is sharing documents with other reviewers/authors in real time. Real time is the actual time during which reviewers are making changes to the document. This can be accomplished with all reviewers working in a Web App.
Features
We Need to Cut a New Deal on Communications Privacy
It is (high) time to rewrite and modernize the law that regulates access to our private communications and to the detailed information those communications automatically create.
Features
Content Owners' Pursuit of Secondary Infringement Claims
Secondary liability can be imposed on an ISP or distributor of a product used to commit infringement based upon claims of contributory infringement, inducement infringement or vicarious infringement. The contributory and inducement claims both focus on a defendant's contribution to the infringement and require that the defendant knows that direct infringement is occurring. These related claims, which provide independent ways to attack secondary infringement, differ in important respects.
Features
Pushing the Technology Envelope in and Out of the Courtroom
Technological advancements have dramatically improved the speed, capabilities and, in most cases, the cost-effectiveness in which deposition, discovery and pre-trial services are provided. Companies that have embraced the latest developments in jury research and selection technology ' particularly social media monitoring tools ' are best situated to thrive in the current environment.
Columns & Departments
IP News
Supreme Court Overturns Burden-Shift in Non-Infringement Judgment <br>Federal Circuit Clarifies Rules for Patent Term Extension<br>Federal Circuit Confirms That All Members of a Priority Chain Must Recite Full Lineage
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- The 'Sophisticated Insured' DefenseA majority of courts consider the <i>contra proferentem</i> doctrine to be a pillar of insurance law. The doctrine requires ambiguous terms in an insurance policy to be construed against the insurer and in favor of coverage for the insured. A prominent rationale behind the doctrine is that insurance policies are usually standard-form contracts drafted entirely by insurers.Read More ›
- A Lawyer's System for Active ReadingActive reading comprises many daily tasks lawyers engage in, including highlighting, annotating, note taking, comparing and searching texts. It demands more than flipping or turning pages.Read More ›
- The Brave New World of Cybersecurity Due Diligence in Mergers and Acquisitions: Pitfalls and OpportunitiesLike poorly-behaved school children, new technologies and intellectual property (IP) are increasingly disrupting the M&A establishment. Cybersecurity has become the latest disruptive newcomer to the M&A party.Read More ›
- Abandoned and Unused Cables: A Hidden Liability Under the 2002 National Electric CodeIn an effort to minimize the release of toxic gasses from cables in the event of fire, the 2002 version of the National Electric Code ("NEC"), promulgated by the National Fire Protection Association, sets forth new guidelines requiring that abandoned cables must be removed from buildings unless they are located in metal raceways or tagged "For Future Use." While the NEC is not, in itself, binding law, most jurisdictions in the United States adopt the NEC by reference in their state or local building and fire codes. Thus, noncompliance with the recent NEC guidelines will likely mean that a building is in violation of a building or fire code. If so, the building owner may also be in breach of agreements with tenants and lenders and may be jeopardizing its fire insurance coverage. Even in jurisdictions where the 2002 NEC has not been adopted, it may be argued that the guidelines represent the standard of reasonable care and could result in tort liability for the landlord if toxic gasses from abandoned cables are emitted in a fire. With these potential liabilities in mind, this article discusses: 1) how to address the abandoned wires and cables currently located within the risers, ceilings and other areas of properties, and 2) additional considerations in the placement and removal of telecommunications cables going forward.Read More ›
- Guidance on Distributions As 'Disbursements' and U.S. Trustee FeesIn a recent case from the Bankruptcy Court for the District of Delaware, In re Paragon Offshore PLC, the bankruptcy court provided guidance on whether a post-plan effective date litigation trust's distributions constituted disbursements subject to the U.S. Trustee fee "tax."Read More ›