Features
Protecting Your Brand in a New gTLD World
For nearly a decade ICANN has been working on a plan to expand the Internet. That process is underway right now, and the expansion will be taking place in just a few months as a slew of top level domains like .nyc, .apple, .citi, .green, .apple, .app, .llc, .club and hundreds more will be going live in the next few months.
Features
Marketing Tech: Using Technology to Streamline Content Marketing
Google the phrase "content marketing" and the CPU on your notebook or tablet will almost explode with search results. Content marketing is hot, especially if you're trying to market legal services.
Features
'Moneyball' for Litigators
Big data is ubiquitous these days, but still largely untapped in legal circles. Litigators can take a page out of a sports team's playbook and use the patterns and trends found in data to make more informed decisions about case staffing, spend management, case strategy and probable outcomes.
Features
<i>Online Extra</i>Apple Digs in for Appeal, Damages Fight in E-Books Case
After failing to remove its court-appointed antitrust monitor, Apple urged the U.S. Court of Appeals for the Second Circuit this week to reverse the e-books price-fixing judgment that led to the monitorship in the first place. Meanwhile, things are heating up in parallel suits brought on behalf of consumers, with Apple trying to move the cases out New York federal court.
Features
<b><i>Online Extra</b></i> FCC To Craft New Net Neutrality Rules
Hoping the third time will be the charm, the FCC announced on Feb. 19 that it will craft new rules for net neutrality that will pass muster with the courts.
Features
<i>Online Extra</i>Cost of Target Data Breach: $61M ' So Far
The recent massive data breach at Target Corp. so far has saddled the retail giant with a $61 million tab ' one that could rise in the future, the company said on Feb. 26.
Columns & Departments
Practice Tip: Making Your Practice Mobile
Whether you are trying a custody case, presenting a CLE, or negotiating a settlement, mobile devices allow you to access data and resources remotely with ease and speed. Here's how to optimize their use.
Features
Go Time for Windows XP
From hardware to software, change is the rule and attorneys who don't want their offices or firms to be a casualty of advancing technology need to be proactive.
Features
Improving Mobile App Privacy
Companies that create and distribute mobile apps are under increasing pressure to protect user data. In 2013, the FTC and the California Attorney General each published privacy recommendations for mobile apps. Among other things, the FTC urges "privacy by design," advising companies to build privacy protections into apps from the outset.
Features
<i>Commentary</i> New Laws Needed To Protect Student Data
Students and schools around the country are utilizing new digital technologies in ways many people did not imagine at the turn of the century ' and those technologies offer great promise. Unfortunately, the current legal framework designed to protect student privacy and safety has not kept up with the rapid advancements that have been created by the Digital Age.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- "Holy Fair Use, Batman": Copyright, Fair Use and the Dark KnightThe copyright for the original versions of Winnie the Pooh and Mickey Mouse have expired. Now, members of the public can create — and are busy creating — their own works based on these beloved characters. Suppose, though, we want to tell stories using Batman for which the copyright does not expire until 2035. We'll review five hypothetical works inspired by the original Batman comic and analyze them under fair use.Read More ›
- The Stranger to the Deed RuleIn 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.Read More ›