Features
Bit Parts
Accounting-Malpractice Claim/Arbitration<br>Contributory and Vicarious Copyright Infringement/Interlocutory Appeal<br>Copyright Infringement/Substantial Similarity<br>Copyright-Infringement Filing/Bankruptcy Purchase
Features
When Is Equipment Not 'Equipment'? Inventory Leasing or Leasing to Rental Companies
Part One of this series discussed special perfection rules for purchase money security interest in inventory and additional risks when leased goods are 'inventory.' This second installment addresses: buyer in ordinary course of business under revised Article '9-320(A); power to transfer and entrusting under '2-403; and rights of buyers and Sublessee in ordinary course under '2A-305.
Features
Revised Proposal: Understanding the Interagency Statement on Complex Structured Finance Activities
Many U.S. financial institutions that have participated in equipment leasing transactions (particularly in the large-ticket and municipal markets) in the last 20 years will be keenly aware that as the structures grew ever more complicated, Congress and the federal regulatory agencies grew intensely interested. Whether the institution had a major role in the transaction or simply provided a service, some degree of scrutiny could be expected, often in conjunction with a tax audit of its client. The risks to financial institutions from participating in complex structured finance transactions of all types became a source for concern for banking and securities regulators. The principal federal regulators responded in 2004 with a proposal that financial institutions investigate, and bear responsibility for evaluating, the legal, tax, and accounting basis of their clients' complex structured finance transactions. The goal: to limit the institutions' own credit, legal, and reputational risk from such participation.
Features
Supreme Court to Review Obviousness Standard: Is a Higher Bar for Patentability Imminent?
In reviewing <i>KSR Int'l v. Teleflex, Inc.</i> (No. 04-1350), the Supreme Court is set to tackle one of the fundamental issues of patentability ' the standard for obviousness under 35 U.S.C. '103. As expected, this case has generated significant interest and numerous <i>amicus</i> briefs have been filed. With oral argument expected to be heard late this month, this case marks the first time in 30 years that the Court will examine this particular issue.
Features
'No Sublicense' Rule Extended to Trademark and Publicity Rights: The Half-Century Saga of Miller v. Glenn Miller Productions, Inc.
It is well settled that a patent or copyright licensee may not sublicense that right absent specific authorization. <i>See, eg, Gardner v. Nike, Inc.</i> 279 F.3d 774 (9th Cir. 2004); <i>Unarco Industries, Inc. v. Kelley Co.</i>, 465 F.2d 1303 (7th Cir. 1972); <i>In re Patient Education Media, Inc,</i> 210 B.R. 237 (S.D.N.Y 1997). Trademarks are often grouped with patents and copyrights as 'intellectual property,' but fundamental differences among the genres exist. <i>See, eg, Sony Corp of America v. University City Studios</i>, 464 U.S. 417, 439 n.17 (1984). Do the same policies supporting the so-called 'no sublicense' rule in the patent and copyright context apply to trademarks and related publicity rights?
Features
News Briefs
Highlights of the latest franchising news from around the country.
Features
The Human Side of Data Security
As headlines continue to report data security breaches at an alarming rate, discussion often focuses on the need for enhanced technical controls, such as two-factor authentication and encryption, to protect sensitive, personally identifiable information. The role of the company employee, both as the cause of, and the first line of defense against, security breaches is often lost in the analysis. Yet developing law is increasingly requiring administrative or procedural controls, particularly those directed at employees, as a component of a legally compliant security program.
Features
<i>Trenwick America</i>
The issue of directors' and officers' liability for deepening insolvency has been the source of a significant number of judicial opinions over the past few years with little consensus being reached on the viability of these claims. This may have changed however. Despite the Delaware Bankruptcy Court's recent decision, <i>In re: Scott Acquisition Corp.</i>, 2006 WL 1732277 (Bankr. D. Del. 2006), which ruled that directors and officers of insolvent subsidiary companies owe fiduciary duties to both its creditors and the subsidiary itself. The Delaware Chancery Court, Vice Chancellor Leo E. Strine presiding, subsequently and resoundingly waded into the breach of fiduciary duty and zone of insolvency arena with its decision in ,<i>Trenwick America Litigation Trust v. Ernst &Young, L.L.P., et al.</i>
Features
Honesty Is Fundamentally the Best Policy
The Superior Court of Pennsylvania recently delivered good news for franchisors and their counsel, as it expressly held 'that there are circumstances where the nature of the breach permits the aggrieved party to immediately terminate the contract despite a 'cure' provision where a franchisee commits grievous acts of dishonest conduct.' In <i>LJL Transp., Inc. v. Pilot Air Freight Corp.</i>, __ A2.d __, 2006 PA Super 176, 2006 WL 1977508 (Pa. Super, Pa. July 17, 2006) (No. 2068 EDA 2005), Judge Richard B. Klein, with Judge Maureen Lally-Green concurring, authored the opinion affirming a Northampton County trial court's order denying the franchisee's motion for summary judgment and granting the franchisor's cross-motion for summary judgment.
Features
Backdating Issues
The recent wave of investigations and lawsuits involving the alleged backdating of stock options promises to become one of the most widespread corporate crises in recent years. As these allegations mount, targets of the investigations will look to their insurance companies to help pay their potentially substantial defense costs and any resulting liabilities. <br>At the same time, insurance companies will be looking for ways to minimize, or even evade entirely, their coverage obligations. As a result, targets of backdating investigations must move quickly to protect their insurance coverage.
Need Help?
- Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
- Need other assistance? email Customer Service or call 1-877-256-2472.
MOST POPULAR STORIES
- Major Differences In UK, U.S. Copyright LawsThis article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.Read More ›
- Strategy vs. Tactics: Two Sides of a Difficult CoinWith each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.Read More ›
- The Article 8 Opt InThe Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.Read More ›
- The Cost of Making PartnerMaking partner isn't cheap, and the cost is more than just the years of hard work and stress that associates put in as they reach for the brass ring.Read More ›