Features
<b><i>Online Extra:</b></i> Nonprofits Ask Copyright Office to Reform DMCA Takedown Procedures
At the end of 2015, the U.S. Copyright Office announced that it would take comments to determine the effectiveness of the safe harbor provisions in the Digital Millennium Copyright Act. It's clear that the Copyright Office will hear some complaints that the DMCA doesn't offer enough of a deterrent against abusive takedown notices.
Features
Cybersecurity Meets EDRM with the Cybersecurity Reference Model
Many legal technology practitioners have great familiarity with the Electronic Discovery Reference Model (EDRM). The model allows attorneys and those who support them to use a common lexicon while wrestling with the complex issues and tasks associated with the discovery process. As the legal technology industry moves deeper into commoditization, new skills, knowledge bases and technology related to security and privacy outside the traditional EDRM will increasingly become the focal point for professional development.
Features
10th Circuit Upholds Tax Reporting Law
Because of a controversial U.S. Supreme Court ruling from 1992, online retailers don't charge sales tax in states where they don't have a physical presence. It's a situation that traditional retailers have bemoaned for years. To their dismay, the U.S. Congress hasn't done a thing about it.
Features
What Non-Delaware Lawyers Need to Know About e-Discovery in Delaware
Many non-Delaware lawyers will, at some point in their careers, find themselves practicing in a Delaware court after being admitted pro hac vice. For those that do, it is important to note that the Delaware courts take e-discovery seriously and have a sophisticated understanding of it. This article serves as a primer on conducting e-discovery in the Delaware courts.
Features
Media & Communications: Engage with Content
Strategy is a high-value word. When something is "strategic," it is seen to have value and purpose. What then is the strategic value and purpose of thought leadership and content marketing?
Features
Wearable Fitness Tracking Devices
As the use of fitness trackers and other personal monitoring devices becomes more prevalent, an increase in consumer litigation over them is inevitable. Because such devices are still cutting-edge in many respects, the opportunities for unexpected manufacturing and design problems is also high. And because some of the data involved may be highly personal, the risk of privacy breach claims is certainly not zero.
Features
Mobile Medical Apps and Product Liability
As mobile medical apps become central to medical care, litigation is inevitable. A threshold issue in such litigation is likely to be whether or not a mobile app is, in the first instance, subject to FDA regulation.
Features
The Cloud and e-Discovery
Leveraging advanced technologies can empower corporate counsel and law firms alike to take control of the ongoing challenge that today's "information on demand" expectations present. When access, disaster recovery, scalability and security are paramount requirements, a migration to the cloud could be the most effective route to help ensure this is accomplished.
Features
10 Lessons from FTC Guidance on Data Security
Not if, but when." These simple words are enough to keep privacy officers, corporate counsel, compliance officers and IT managers up at night when faced with the reality that their network will at some point be breached. While there are no silver bullets to stop breaches from occurring, understanding and following legal actions brought by regulatory agencies and heeding security guidance they issue can go a long way.
Features
Social Media Scene: Teach Your Lawyers Well
Last month, in Part One of this article, we discussed the fact that one size does not fit all when it comes to social media training for lawyers. We continue herein with a look at the inevitable changes in ways that lawyers do business.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- Warehouse Liability: Know Before You Stow!As consumers continue to shift purchasing and consumption habits in the aftermath of the pandemic, manufacturers are increasingly reliant on third-party logistics and warehousing to ensure their products timely reach the market.Read More ›
- The Anti-Assignment Override ProvisionsUCC Sections 9406(d) and 9408(a) are one of the most powerful, yet least understood, sections of the Uniform Commercial Code. On their face, they appear to override anti-assignment provisions in agreements that would limit the grant of a security interest. But do these sections really work?Read More ›