Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Features

Second Circuit Reinstates Antitrust Claim Against Online Music Providers Image

Second Circuit Reinstates Antitrust Claim Against Online Music Providers

Mark Hamblett

A federal appeals court has reinstated an antitrust suit alleging price fixing by Sony BMG Music Entertainment and other producers, licensors and distributors of music on the Internet.

Features

Five Steps to Managing Social Media Risks Image

Five Steps to Managing Social Media Risks

Douglas J. Wood

On the one hand, companies want to capture the attention of potential customers roaming the social media space. On the other hand, conversations in the blogosphere are largely uncontrollable, and raise a myriad of risks. Social media can cause serious losses if not handled correctly.

Features

Third Circuit Tackles Teen 'Sexting' As Child Pornography Image

Third Circuit Tackles Teen 'Sexting' As Child Pornography

Shannon P. Duffy

As the nation's first case involving criminal prosecutions of teenagers for "sexting" made its way to a federal appeals court in Philadelphia, all three judges seemed skeptical of the prosecutor's claim that child pornography laws are violated when a teen transmits a nude image of herself.

Features

Registering Marks As Top-Level Domain Names Image

Registering Marks As Top-Level Domain Names

Robert B.G. (Red) Horowitz

The Internet Corporation for Assigned Names and Numbers ("ICANN") plans to issue generic top-level domain names ("gTLDs") beyond the current 21 top-level domain names ("TLDs") such as .com and .net. For the first time, trademark owners may use their marks as gTLDs; for example, .nike. The application process is complex, and trademark owners have no guarantee that they will secure gTLDs for their marks. e-Commerce providers, however, can use trademark-law strategy to gain advantages during the application process.

Features

e-Getting Your Back Image

e-Getting Your Back

Stanley P. Jaskiewicz

Science tells us that most of an iceberg is hidden beneath the surface of the ocean. e-Commerce law tells us the same thing about Web-site development: The "Web front" that shoppers see can be dwarfed by the hidden, or invisible, "back office" ' the contracts, negotiations and software that make e-commerce Web sites possible. Yet it is that back office that can be the difference between a profitable site and one, like a true iceberg, that is merely adrift and fraught with potential hazards.

Features

Selected Privilege Issues for Franchise Counsel Image

Selected Privilege Issues for Franchise Counsel

Eric H. Karp & Les Wharton

As recent litigation has demonstrated, the use of new communications devices with new capabilities is having an effect on how attorneys and their clients communicate, and, therefore, is raising issues in attorney-client privilege.

Features

Interpreting FTC's New Endorsement Guidelines Image

Interpreting FTC's New Endorsement Guidelines

Alan L. Friel

This series examines changes to the Federal Trade Commission guidelines for product endorsements and testimonials. The revised new guidelines took effect Dec. 1, 2009.

Features

Examining the 'Harmless Errors' Provision for Copyright Termination Notices Image

Examining the 'Harmless Errors' Provision for Copyright Termination Notices

Stan Soocher

Record labels fear the ticking clock that will allow recording artists to terminate post-1977 sound-recording assignments beginning in 2013. That's because '203 of the U.S. Copyright Act provides for a grantor's recapture of assigned copyrights during a five-year period beginning 35 years after publication or 40 years from the assigning of a work. The termination right applies beyond sound-recording copyrights. Pre-1978 copyright assignments may be recaptured under 17 U.S.C. '304(c) during a five-year period that begins 56 years after the copyright in an assigned work was initially procured

Features

Best Practices for Transitioning to Word 2007 Image

Best Practices for Transitioning to Word 2007

Roberta Gelb

In the arena of technology, it is hard to forget those traumatic events when the whole world seemed to change on a dime. Nowhere is this felt as extremely as in the legal industry where document production requirements are time critical. How do you help your staff transition to Word 2007 so that they may reach the same productivity levels as before? This article provides some tips to lessen the anxiety and drama potentially associated with this migration.

Features

'Voodoo Information': Authenticating Web Pages In Federal Court Image

'Voodoo Information': Authenticating Web Pages In Federal Court

M. Anderson Berry & David Kiernan

During the life of any case, there will likely be valuable information obtained from the Internet that will be used at deposition or trial. Commonly, the proponent of online evidence will present a screen shot of the Web page, which was either downloaded as a .pdf or printed directly from the Web site. The process is like taking a photograph of the image as it appears on the monitor. In general, this captures not only the look, but also the download date and the URL. If proper steps are not taken to admit the evidence, the value of this information may be lost.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›